Windows 10 Enterprise 2019 LTSC for Dell Wyse Thin Clients ’s Guide March 2021 Rev. A04
This guide is intended for thin client administrators running Windows 10 IoT Enterprise ... Getting started. The Quick Start application launches when you boot into a thin client for the ... Configuring Bluetooth connections. You can use your thin client device with other...
Windows 10 Enterprise 2019 LTSC for Dell Wyse Thin Clients Administrator's Guide March 2021 Rev. A04 Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. © 2020-2021 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be trademarks of their respective owners. Contents Chapter 1: Introduction................................................................................................................. 6 Technical support................................................................................................................................................................ 6 About this guide................................................................................................................................................................... 6 Supported thin clients........................................................................................................................................................ 6 Chapter 2: Getting started............................................................................................................ 7 Automatic and manual login.............................................................................................................................................. 7 Before configuring your thin clients................................................................................................................................ 7 Using your desktop..............................................................................................................................................................7 Using the Start Menu................................................................................................................................................... 8 Using the search box.................................................................................................................................................... 8 Grouping Applications into Desktops........................................................................................................................ 8 Using Action Center...................................................................................................................................................... 8 Connecting to a printer or an external device........................................................................................................ 9 Connecting to a monitor.............................................................................................................................................. 9 Power state.....................................................................................................................................................................9 Chapter 3: Accessible applications...............................................................................................10 Browsing with Internet Explorer.....................................................................................................................................10 Using the Dell Thin Client Application........................................................................................................................... 10 Using VMware Horizon Client to connect to virtual desktop.................................................................................. 11 Citrix Workspace app ........................................................................................................................................................11 Configuring remote desktop connection session services.......................................................................................12 Using Ericom Connect and WebConnect client..........................................................................................................13 Using Ericom PowerTerm Terminal Emulation............................................................................................................13 Windows Media Player......................................................................................................................................................14 Wyse Easy Setup................................................................................................................................................................14 Overlay Optimizer.............................................................................................................................................................. 14 Cisco Jabber Softphone for VDI.................................................................................................................................... 14 Setting up the Cisco Jabber Softphone for VDI...................................................................................................15 Using Cisco Jabber...................................................................................................................................................... 15 Chapter 4: Administrative features.............................................................................................. 17 Using Administrative tools............................................................................................................................................... 17 Configuring component services.............................................................................................................................. 17 Viewing events..............................................................................................................................................................17 Managing services........................................................................................................................................................17 Using TPM and BitLocker................................................................................................................................................ 18 Initialize TPM and enable BitLocker using the imaging script ..........................................................................18 Initialize TPM and enable BitLocker manually....................................................................................................... 19 Configuring Bluetooth connections.............................................................................................................................. 20 Configuring wireless local area network settings...................................................................................................... 20 Using custom fields...........................................................................................................................................................20 Configuring RAM disk size............................................................................................................................................... 21 Contents 3 Enabling auto logon........................................................................................................................................................... 21 System shortcuts.............................................................................................................................................................. 22 Viewing and configuring SCCM components............................................................................................................. 22 System Center Configuration Manager Client 2016 and 2019......................................................................... 23 Devices and printers......................................................................................................................................................... 23 Adding printers.............................................................................................................................................................23 Adding devices............................................................................................................................................................. 24 Configuring multi-monitor display................................................................................................................................. 24 Managing audio and audio devices................................................................................................................................24 Using sound dialog box...............................................................................................................................................24 Additional language support........................................................................................................................................... 25 Setting region.....................................................................................................................................................................25 Managing user accounts..................................................................................................................................................26 Using Windows Defender................................................................................................................................................ 26 Windows Defender Advanced Threat Protection......................................................................................................26 Threat Defense.................................................................................................................................................................. 27 Endpoint Security Suite Enterprise............................................................................................................................... 27 C-A-D tool........................................................................................................................................................................... 27 Wyse Device Agent...........................................................................................................................................................28 Citrix HDX RealTime Media Engine...............................................................................................................................28 Viewing and exporting operating system image manifest files ............................................................................. 28 Viewing and exporting operating system image current manifest information ...........................................28 Viewing operating system image factory manifest information.......................................................................29 Chapter 5: Additional administrator utility and settings information........................................... 30 Automatically launched utilities......................................................................................................................................30 Utilities affected by log off, restart, and shut down................................................................................................ 30 Unified Write Filter.............................................................................................................................................................31 Using Unified Write Filter.......................................................................................................................................... 32 Running Unified Write Filter commandline options...........................................................................................32 Enabling and disabling the Write Filter using the desktop icons......................................................................33 Setting Write Filter controls..................................................................................................................................... 33 Application Launch Manager.......................................................................................................................................... 34 ALM CLI tool.................................................................................................................................................................35 Configuration of nodes using ALM..........................................................................................................................35 xData Cleanup Manager.................................................................................................................................................. 35 xDCM CLI tool..............................................................................................................................................................36 Configuration of nodes using xDCM.......................................................................................................................36 Capturing logfiles...............................................................................................................................................................37 Configuration of DebugLog XML file...................................................................................................................... 37 Saving files and using local drives................................................................................................................................. 38 Mapping network drives.................................................................................................................................................. 38 Participating in domains...................................................................................................................................................38 Using the Net and Tracert utilities................................................................................................................................39 Managing Users and Groups with User Accounts.....................................................................................................40 Creating user accounts.............................................................................................................................................. 40 Editing user accounts................................................................................................................................................. 40 Configuring user profiles............................................................................................................................................40 Changing the computer name of a thin client.............................................................................................................41 Removing language and feature on demand packages.............................................................................................41 4 Contents Language codes................................................................................................................................................................. 43 Adding languages to LTSC 2019 (RS5)....................................................................................................................... 43 Windows 10 IoT enterprise language packages..........................................................................................................44 Imaging using Dell Application Control Center........................................................................................................... 48 USB imaging using DACC.......................................................................................................................................... 48 Wyse Management Suite imaging using DACC....................................................................................................50 Chapter 6: System administration............................................................................................... 53 Accessing thin client BIOS settings.............................................................................................................................. 53 Unified Extensible Firmware Interface and secure boot..........................................................................................53 Creating bootable UEFI USB key ............................................................................................................................53 Using Dell Wyse Management Suite.............................................................................................................................53 Ports and slots................................................................................................................................................................... 54 TightVNC--server and viewer.......................................................................................................................................54 TightVNC--Pre-requisites..............................................................................................................................................54 Using TightVNC to shadow a thin client .................................................................................................................... 55 Configuring TightVNC server properties on the thin client ...................................................................................55 Chapter 7: Network architecture and server environment........................................................... 56 Understanding how to configure your network services........................................................................................ 56 Using Dynamic Host Configuration Protocol..............................................................................................................56 DHCP options.....................................................................................................................................................................56 Using Domain Name System...........................................................................................................................................57 About Citrix Studio............................................................................................................................................................57 About VMware Horizon View Manager....................................................................................................................... 58 Chapter 8: Installing firmware using USB Imaging Tool............................................................... 59 Chapter 9: Frequently asked questions........................................................................................60 How to install Skype for Business.................................................................................................................................60 How to set up a smart card reader...............................................................................................................................60 How to use USB Redirection..........................................................................................................................................60 How to prepare a Windows 10 IoT Enterprise operating system image for capture........................................ 60 Using Sysprep--User Interface................................................................................................................................61 Using Wyse Management Suite.....................................................................................................................................64 How to capture and push Windows 10 IoT Enterprise operating system image............................................... 65 How to update Windows 10 IoT Enterprise 2016 LTSB to Windows 10 IoT Enterprise 2019 LTSC..............65 Chapter 10: Troubleshooting....................................................................................................... 66 Keyboard customization issues......................................................................................................................................66 Resolving memory issues................................................................................................................................................ 66 Using Windows Task Manager................................................................................................................................. 66 Using Unified Write Filter.......................................................................................................................................... 66 Using File Explorer...................................................................................................................................................... 66 CADMAP tool interfering with published application shortcut keys..................................................................... 67 WiFi settings configured from Wyse Management Suite are not persistent across multiple Wyse 5070 thin clients............................................................................................................................................................ 67 Wyse Management Suite registration information is not cleared after the Sysprep process........................68 Contents 5 1 Introduction Dell Wyse thin clients that run the Windows 10 IoT Enterprise 2019 LTSC operating system provide access to applications, files, and network resources. The applications and files are made available on machines hosting Citrix Receiver, Remote Desktop Connection, and VMware Horizon Client session. Other locally installed software permits remote administration of thin clients and provides local maintenance functions. More add-ons that support a wide range of peripherals and features are available for environments that require a secure user interface with 64-bit Windows compatibility. For more information, see www.microsoft.com. To activate your Windows 10 operating system offline, see Activating Windows 10 Offline at www.microsoft.com. NOTE: Windows 10 IoT operating system gets activated when you connect the thin client to the Internet. If the Microsoft activation servers are busy, you must wait until the Windows 10 IoT is activated. To check the activation status, go to Start > Settings > Update & Security > Activation. The features that are mentioned in this guide vary depending on the thin client model at your workplace. For more information about the features applicable for your thin client, see the respective User Guides at support.dell.com/ manuals. Technical support To access technical resources self-service portal, knowledge base articles, software downloads, registration, warranty extensions/RMAs, reference manuals, contact information, and so on, visit www.support.dell.com. About this guide This guide is intended for thin client administrators running Windows 10 IoT Enterprise 2019 LTSC. It provides information and detailed system configurations to help you design and manage a Windows 10 IoT Enterprise environment. Supported thin clients The following are the list of thin clients that run the Windows 10 IoT Enterprise 2019 LTSC operating system: Wyse 5070 Thin Client with Celeron processor Wyse 5070 Thin Client with Pentium processor Wyse 5070 Extended Thin Client with Pentium processor Wyse 5470 Thin Client Wyse 5470 All-in-One Thin Client NOTE: The Wyse 5070 Thin Client supports Windows 10 IoT Enterprise 2019 LTSC and Windows 10 IoT Enterprise 2016 LTSB operating systems. 6 Introduction 2 Getting started The Quick Start application launches when you boot into a thin client for the first time. This tool displays the software and hardware features of the thin client. It also provides information about the VDI applications, management software, and supported peripherals. You can also install the Wyse Easy Setup application using the Quick Start application. The Wyse Easy Setup application enables administrators to quickly and deploy configurations on thin clients. For more information, see Wyse Easy Setup. After you exit the Quick Start application, the user desktop is displayed by default. You can also launch the tool later. You can log in to the thin client as a user or an administrator. An administrator can configure a user account to log in automatically or manually by entering the login credentials. You can use Wyse Management Suite to centrally configure, monitor, manage, and optimize your thin clients. For more information, see Using Wyse Management Suite. NOTE: You can also use System Center Configuration Manager and VMware Workspace One to manage your thin clients. For more information about VMware Workspace One, see VMware Workspace ONE Documentation at docs.vmware.com. Automatic and manual login When a thin client turns on or reboots, you can log in automatically or manually with user or administrator credentials depending on the administrator's configuration. For more information, see Managing Users and Groups with user accounts. NOTE: Ensure that you disable the Unified Write Filter (UWF) before you change a password on the thin client, and then enable UWF after your change. For more information, see Before configuring your thin clients. To change the password, press Ctrl+Alt+Delete, and then click Change a password. However, this feature is not applicable for User accounts. When you start the thin client, you will automatically log in to the user desktop by default. To log in with a different user account, you must sign out and click the preferred user account on the login screen. You can use the following credentials to log in to different user accounts: Administrators--The default user name is Admin and the default case-sensitive password is DellCCCvdi. Users--The default user name is User and default case-sensitive password is DellCCCvdi. Customized User--Log in to your thin client by entering the user credentials which you have set for the customized user account. Before configuring your thin clients Before you configure your thin clients, ensure that you configure Unified Write Filter and xData Cleanup Manager that protect your thin clients. The Unified Write Filter Utility prevents undesired flash memory writes, and xData Cleanup Manager cleans up extraneous information from being stored on the local disk. However, there are instances where administrators can retain the changed configurations after you log out and restart the thin client. Using your desktop The administrator set configurations are displayed when you log in to the thin client at the first instance. Getting started 7 If you log in as an administrator, the Administrator Desktop is displayed. On the right of the taskbar, click the Notifications icon to open the Action Center window. For more information about the Action Center, see Using Action Center. In addition to the Standard Desktop icons, an extended set of resources for configuring user preference settings and system administration is included in the administrator control panel. To open control panel, go to Start > Control Panel. For more information, see Administrative features. Using the Start Menu About this task The Start Menu helps you to access all programs, folders, and settings on your thin client. It contains a list of applications that are installed on your thin client. NOTE: On the Start Menu, you can view the list of frequently used applications under Most Used. Using the search box About this task Use the search box on the taskbar to look for applications, files, or settings. You can type what you are searching for in the search box on the taskbar. You can also find results for files, applications, or settings across your thin client. The suggestions and results related to your searched item are displayed in the Home window. Next steps NOTE: To search for a particular file on your thin client, apply any of the following filters available in the lower pane of the Home window, and then search for your desired file: Applications filter Settings filter Documents filter Folders filter Photos filter Videos filter Musics filter Grouping Applications into Desktops Create virtual desktops, to group your applications together. In the taskbar, click the Task View icon, and then in the New Desktop, open the applications you need. To move applications between virtual desktops, click Task View, and then drag the application you want from one desktop to another. Using Action Center Action center displays important notifications from Windows and your applications on the taskbar, along with quick actions, which get you to your most-used settings and applications instantly. To view your notifications and quick actions, click the Action Center icon on the taskbar. You can also press Windows logo key+A. Notifications at a glance--When a notification appears on your desktop or when you view it in Action Center, expand it to read more or take action without having to open the related application. You can also clear the notification by selecting and dragging it off the screen to the right, or by clicking the Close button. 8 Getting started Quick Action icons--Quick Action icons allow you to access All Settings and applications that you use often, such as Bluetooth to VPN. Select the Expand option to see the settings and applications such as location, the quiet hours, brightness, bluetooth, VPN, the battery saver, project, and connect. The following are the Quick Action options in the Action Center: Tablet Mode--Tablet mode makes Windows easier and more intuitive to use with touch on devices such as 2in1s, or when you do not want to use a keyboard and mouse. To turn on tablet mode, click the Action Center icon on the taskbar, and then select Tablet Mode. Connect--Use this option to connect to your wireless and bluetooth devices. All Settings--Use this option to configure Windows settings. For more information, see Using the Start Menu. Airplane mode--Use this option to turn off the wireless transmission functions on your device and enable Airplane mode. Connecting to a printer or an external device You can connect USB-interfaced printers or a USB-to-parallel adapter-interfaced printer to your thin client device using a USB port. Follow your printer's USB installation instructions before connecting to a USB port. To connect to the printer, add the printer to the thin client device by using the Add Printer wizard. For more information, see Adding printers. If you want to connect to an external device, add the device to the thin client device. For more information, see Adding devices. Connecting to a monitor Based on the thin client model, you can connect to an external monitor using the following ports: HDMI port VGA port DisplayPort DVI port DVI-D port Type-C port For more information about configuring a dual monitor display, see Configuring dual monitor display. Power state About this task You can change the power state options of the thin client device by following the steps mentioned here: Steps 1. On the taskbar, click the Start Menu button. 2. Click Power on the start menu, and select any of the options: Sleep--This mode uses little power, your thin client device starts up faster. Shut down--Preferred for closing all your open programs, and to shut down your operating system. Restart--The thin client device is turned off and turned on instantly. To use the power state options press ALT+F4, and then select your preferred option from the drop-down list. NOTE: If automatic login is enabled, the thin client immediately logs in to the default user desktop. Getting started 9 3 Accessible applications When you log in to your thin client as an administrator or a user, the Windows desktop displays certain extended features in the Start menu. NOTE: Keyboard Caps Lock Indicator Application--Dell Keyboard driver software (KM632) software provides the Caps Lock status indication on the desktop. After you log in to your thin client, when you press the Caps Lock key to enable the Caps Lock feature, the lock symbol is displayed on the desktop. If you press the Caps Lock key again to disable the Caps Lock feature, the unlock symbol is displayed on the desktop. Browsing with Internet Explorer To open Internet Explorer, do either of the following: Go to Start > Windows Accessories > Internet Explorer. Double-click the Internet Explorer icon on the desktop. NOTE: To limit writing to the disk, Internet Explorer settings are set at the factory. The settings prevent you from using the limited amount of disk space available. It is recommended that you do not modify these settings. Internet Explorer cache settings are set to 100 MB. Using the Dell Thin Client Application Use the Dell Thin Client Application to view the general information about the thin client device, custom fields, RAM disk, auto login, system shortcuts, and support information. To access the Dell Thin Client Application page, go to Start > Dell Thin Client Application. You can also access the Dell Thin Client Application by clicking the Dell Thin Client Application icon on the desktop. In the left navigation bar, click the following tabs: Client Information--Displays the thin client device information. QFE--Displays the list of Microsoft QFEs (previously known as hot fixes) applied to the thin client. Installed Products--Displays the list of applications that are installed on the thin client. WDM/WMS Packages--Displays the list of WDM and WMS packages that are applied to the thin client. Copyrights/Patents--Displays copyrights and patents information. When you log in as an administrator, you can view the tabs such as Custom Fields, RAM disk, Auto Logon, System Shortcuts, and About and Support on the Dell Thin Client Application page. Energy Star logo (an electronic logo) for the Energy Star compliance is also displayed on the Dell Thin Client Application page. In the About and Support tab, you can view the information that is related to the application version, support directory, export support data, and HTML view. For more information, see Administrative features. NOTE: The information that is shown in the dialog box varies for different thin client devices and software releases. When you log in as a user, only few tabs such as Client Information, QFE, Installed Products, WDM/WMS Packages, Copyrights/Patents, and About and Support are displayed. 10 Accessible applications Using VMware Horizon Client to connect to virtual desktop VMware Horizon Client is a locally installed software application that communicates between View Connection Server and thin client operating system. It provides access to centrally hosted virtual desktops from your thin clients. It provides virtualized or hosted desktops and applications through a single platform to end users. To connect to a virtual desktop, use the VMware Horizon Client window. About this task To open and use the VMware Horizon Client window: Steps 1. Log in as a user or an administrator. 2. Access the VMware Horizon Client window using one of the following options: From the Start Menu, click VMware > VMware Horizon Client. Double-click the VMware Horizon Client icon on the desktop. The VMware Horizon Client window is displayed. 3. In the VMware Horizon Client window, use the following guidelines: a. To add a new server connection, either click the New Server option or double-click the Add Server icon in the VMware Horizon Client window. The VMware Horizon Client dialog box is displayed. b. In the VMware Horizon Client dialog box, type a host name or an IP address of a VMware Horizon Connection Server in the connection server box. c. Click Connect. d. In the Login dialog box, enter the user name and login password in the respective boxes. e. From the Domain drop-down list, select the domain where the server is located. f. Click Login. The VMware Horizon Client connects to the selected desktop. After connection is established, the list of published desktops is displayed. g. Right-click the particular application or the desktop icon, and then click Launch to connect to that application or desktop. For more information on VMware Horizon Client, see www.vmware.com. NOTE: Certificate checking mode--Certificate checking mode determines how the client proceeds when the client cannot verify that your connection to the server is secure. It is recommended that you do not change this setting unless instructed by your system administrator. To access the certificate checking mode, click the icon on the upper-right corner of the window, and then click Configure SSL from the drop-down list. In the VMware Horizon Client SSL configuration dialog box, select from any of the following options based on your requirements: Never connect to untrusted servers Warn before connecting to untrusted servers Do not verify server identify certificates Citrix Workspace app Citrix Workspace app is preinstalled on your thin clients. You can also install Citrix Workspace app on the thin client to access your applications and desktops using Citrix Virtual Apps and Desktops from a remote client device. Citrix Workspace app provides access from your desktop, Start menu, Citrix Workspace user interface, and web browsers. You can use Citrix Workspace app on domain and non-domain joined thin clients. For more information, see Citrix Workspace app for Windows Embedded Operating System Release Notes at support.dell.com. Accessible applications 11 Configuring remote desktop connection session services Prerequisites Remote desktop connection is a network protocol that provides a graphical interface to connect another computer over a network connection. NOTE: If you use a Windows Server, or Citrix XenApp 5.0 with Windows Server, a Terminal Services Client Access License (TSCAL) server must also be accessible on the network. The server grants a temporary license, which expires after 120 days. After the temporary license expires, purchase and install the TSCALs on the server. You cannot establish a connection without a valid temporary or permanent license. About this task To configure a remote desktop connection: Steps 1. Log in as a user or an administrator. 2. From the Start menu, click Remote Desktop Connection, or double-click the Remote Desktop Connection icon on the desktop. The Remote Desktop Connection window is displayed. 3. In the Computer box, enter the computer or the domain name. 4. For advanced configuration options, click Show Options. a. In the General tab, you can enter the login credentials, edit or open an existing RDP connection, or save a new RDP connection file. b. In the Display tab, manage the display and the color quality of your remote desktop. Move the slider to increase or decrease the size of your remote desktop. To use full screen, move the slider all the way to the right. Select the color quality of your preference for your remote desktop from the drop-down list. Select or clear the Display the connection bar when I use the full screen check box to display or hide the connection bar in full screen mode. c. In the Local Resources tab configure audio, keyboard, or local devices and resources for your remote desktop. In the Remote audio section, click Settings for advanced audio settings options. In the Keyboard section, choose when and where to apply keyboard combinations. In the Local devices and resources section, select devices and resources that you want to use in your remote session. Click More for more options. d. In the Experience tab optimize the performance of your remote session based on the connection quality. NOTE: If the Unified Write Filter cache is full, you can disable the Bitmap caching in the Experience tab after clicking Show Options in the window. e. In the Advanced tab, select the action to be taken when the server authentication fails and configure settings for connection through Remote Gateway. 5. Click Connect. 6. To connect to the remote session, enter the login credentials in the Security dialog box. The remote desktop is displayed with the connection bar on the top if you select the Display the connection bar. 12 Accessible applications Using Ericom Connect and WebConnect client Prerequisites Ericom Connect and WebConnect client provides you with remote access to Windows desktops and applications from any compatible phone or tablet. It is dedicated for managed broker access. Ericom Connect and PowerTerm WebConnect connections use the Secure Gateway as the address. You can access the Ericom Connect-WebConnect client either as a stand-alone application or on a network. About this task To access the Ericom Connect and WebConnect client as a stand-alone application: Steps 1. Log in as a user or an administrator. 2. Go to Start > Ericom Connect-WebConnect client > Ericom Connect-WebConnect client or double-click the Ericom Connect-WebConnect client icon on the desktop. The Ericom AccessPad login window is displayed. 3. In the Ericom AccessPad login window, enter your credentials, and click Login. The DELL Ericom Application Zone window is displayed. NOTE: By default, the Ericom AccessPad login window is displayed. To set the UI to your preferred language, click the Globe icon in the lower-right corner of the window, and select your preferred language from the drop-down list. 4. In the DELL Ericom Application Zone window, published applications such as the Blaze demo server, RDP demo server, the Ericom server, and Paint are displayed. Double-click any of the applications to access them. You can also add your own applications from the server site. 5. To create a shortcut on your desktop, click Options > Create a shortcut on Desktop in the DELL Ericom Application Zone window. 6. To log out, click File > Logout in the DELL- Ericom Application Zone window. Example To access the Ericom Connect-WebConnect client through the web browser: 1. Double-click the Internet Explorer icon. The Internet Explorer web page is displayed. 2. Enter http://serverIP/FQDNWebConnect6.0/AppPortal/Index.asp URL to access the Ericom Power Term Emulation. The PowerTerm WebConnect Application Portal page is displayed. 3. In the PowerTerm WebConnect Application Portal page, enter the credentials and the domain name. 4. Click Login. 5. After you log in, the published desktops and applications such as the Blaze demo server, RDP demo server, and Paint are displayed. Double-click any of the applications to access them on a new web page. You can also add your own applications from the server sit. 6. Click Logout on the left side of the PowerTerm WebConnect Application Portal page to end the Ericom Power Term WebConnect session. Using Ericom PowerTerm Terminal Emulation About this task To manage your connections using Ericom PowerTerm Terminal Emulation, do the following: Accessible applications 13 Steps 1. Open the TELNET : PowerTerm InterConnect for thin clients window, using one of the following options mentioned: Double-click the PowerTerm Terminal Emulation icon on the desktop. From the Start Menu, click Ericom PowerTerm Terminal Emulation > PowerTerm Terminal Emulation. 2. In the Connect dialog box, go to Session Type > TELNET to configure the connection of your choice. Windows Media Player Windows Media Player provides an intuitive, and easy-to-use interface to play digital media files. It organizes your digital media collection, and you can burn CDs of your favorite music, extract music from CDs, sync digital media files to a portable device, and shop for digital media content from online stores. For more information, see Windows media player documentation at https://support.microsoft.com. Wyse Easy Setup Wyse Easy Setup enables administrators to quickly and easily deploy configurations on thin clients. Wyse Easy Setup enables you to: Create a dedicated browser-focused client by configuring the Internet Explorer settings. Configure multiple broker connections such as Citrix, VMware, and Remote Desktop Protocol (RDP). Configure a device to create a dedicated application for a particular line of business. You can create a kiosk mode to lock down a Windows device to prevent users from accessing any features or functions on the device outside of the kiosk mode. You can also customize the kiosk interface to enable or disable user access to specific settings. For more information, see Wyse Easy Setup videos at www.youtube.com, and Wyse Easy Setup Administrator's Guide and Release notes at https://downloads.dell.com/wyse. Overlay Optimizer Overlay Optimizer is a software component that works with Microsoft Unified Write Filter (UWF). Overlay Optimizer provides write protection and extends the uptime of devices. Overlay optimizer works on the Windows 10 IoT Enterprise operating system. The UWF protects the disk by storing the changes in the RAM overlay. When an application tries to write data to the disk, the write filter redirects the write operations to the RAM overlay. The overlay size is preconfigured and cannot increase dynamically. When the overlay runs out of space over a period, the device restarts. The Overlay Optimizer monitors the UWFs' overlay space and the content. Overlay Optimizer identifies higher overlay space consumption in write filter and moves the unused content to the Overlay Optimizer's disk overlay. Clearing the UWF overlay extends the device uptime. For more information, see Overlay Optimizer Release notes at https://downloads.dell.com/wyse/. Cisco Jabber Softphone for VDI Cisco Jabber Softphone for VDI (JVDI) is the Unified Communications solution offered by Cisco for virtual deployments. It supports audio conferencing and instant messaging on the Hosted Virtual Desktops (HVD). The Cisco Jabber Softphone for VDI software offloads the audio processing from the virtual desktop servers to the thin client. All audio and video signals are routed directly between the endpoints without entering the HVD environment. Cisco Jabber Softphone for VDI enables you to make and receive calls using the Cisco Unified Communications application. Cisco Jabber Softphone for VDI consists of the following two components: Cisco JVDI Agent Cisco JVDI Client 14 Accessible applications Cisco JVDI Agent is the JVDI connector that runs on the Citrix desktop or server. Cisco JVDI client is the JVDI package that runs on the thin client. The Jabber client that runs on the Citrix server handles the authentication, and the media processing is achieved on the thin client. Setting up the Cisco Jabber Softphone for VDI About this task This section describes how to install and use the Cisco Jabber Softphone for VDI on a Citrix desktop. Steps 1. Go to www.cisco.com, and download the following software: Cisco JVDI Agent 12.8 Cisco Jabber application 12.8 2. On the Citrix virtual desktop, install Cisco JVDI Agent. Double-click the file and follow the installation wizard steps. 3. On the Citrix virtual desktop, install Cisco Jabber. For information about the installation procedure, see the installation guide at www.cisco.com. 4. Install the JVDI.pkg on the thin client using Wyse Management Suite. 5. Log in to the Citrix virtual desktop, and sign in to Cisco Jabber using your user credentials. When you log in for the first time, do the following: a. On the Cisco Jabber interface, click Advanced Settings. b. Select your account type as Cisco Communications Manager 9 or later. c. Enter the login server address. NOTE: If the Use my computer for calls option is selected, Cisco Jabber is automatically registered with Cisco Unified Communications Manager. This option enables Jabber to work as a Softphone, and use the microphone or speaker that is connected to the thin client for phone calls. Using Cisco Jabber Use the Cisco Jabber application to perform the following tasks: Start an audio call Answer the call Hold or resume the call Stop the video Mute or unmute the audio Turn on or turn off the self-view Enter or exit the full screen Merge the calls Audio conferencing Transfer the call Play voice mail Forward the call to voicemail Forward the call to another number Forward voice messages directly Use the Device Selector menu to switch between headsets Use the Device Selector menu to switch between cameras Set up secure phone capabilities Answer the call on multiple phone devices (Shared Line feature) NOTE: It is recommended that you reduce the video resolution to 640 x 360p with 30fps on the Wyse 3040 Thin Client. For information about troubleshooting your Cisco Jabber, see the Deployment and Installation Guide for Cisco Jabber Softphone for VDI at www.cisco.com. Accessible applications 15 For information about Cisco Jabber-related issues, see the Release notes for Cisco Jabber Softphone for VDI document at www.cisco.com. For information about accessories for headsets and speakers, see the Unified Communications Endpoint and Client Accessories article at www.cisco.com. 16 Accessible applications 4 Administrative features Admin is a default user profile that is created for the user who is a member of the administrator group. To log in as an administrator, see Automatic and manual login. When you log in to your thin client device as an administrator, you can access certain notable extended features in the Control Panel. To access the Control Panel, on the taskbar, click Start Menu > Control Panel. Using Administrative tools To access the Administrative Tools window, click Start > Control Panel > Administrative Tools. You can use the Administrative tools window to perform the following tasks: Configuring the component services Managing the services Configuring component services To access and configure the component services, event viewer, and local services use the Component Services console. About this task For more information, see Administrative Tools in Windows 10 at docs.microsoft.com. Viewing events About this task To view monitoring and troubleshooting messages from Windows and other programs, use the Event Viewer window. In the Component Services console, click the Event Viewer icon from the Console Root tree. The summary of all the logs of the events that have occurred on your computer is displayed. For more information, see Event Viewerat docs.microsoft.com. NOTE: Event logs are lost on reboot because of Write Filter. Managing services To view and manage the services installed on the thin client device, use the Services window. To open the Services window, go to Start > Control Panel > Administrative Tool Services. Steps 1. In the Component Services console, click the Services icon from the console tree. The list of services is displayed. 2. Right-click the service of your choice. You can perform Start, Stop, Pause, Resume, and Restart operations. You can select the Startup type from the drop-down list: Automatic (Delayed Start) Automatic Manual Disabled For more information, see Component Services Administration at docs.microsoft.com. Administrative features 17 NOTE: Ensure that the Write Filter is disabled while managing the services. Using TPM and BitLocker Trusted Platform Module (TPM)--A TPM is a microchip that provides basic security-related functions, that primarily involve encryption keys. BitLocker Drive Encryption (BDE)--A BDE is a full disk encryption feature that protects data by providing encryption for entire volumes. By default, it uses the AES encryption algorithm in Cipher Block Chaining (CBC) mode with a 128-bit key. This algorithm is combined with the Elephant diffuser for extra disk encryption-specific security. Windows 10 IoT Enterprise does not support sysprep on a BitLocker encrypted device. Due to this limitation, you cannot encrypt the device, perform a sysprep, and pull the image. To overcome this issue, you must add or modify the TPM script. The device must not be encrypted before sysprep (pull). The device encryption is handled by the post push script that uses the TPM_enable.ps1 script that is at C:\Windows\setup\tools\. The post push script must be included before enabling the UWF and after sysprep scripts. The PIN used to encrypt the client must be passed to the script as an argument. You can initialize TPM and enable BitLocker using any of the following methods: Initialize TPM and enable BitLocker using the imaging script. Initialize TPM and enable BitLocker manually. Initialize TPM and enable BitLocker using the imaging script Prerequisites Enable alphanumeric pin support for TPM and BitLocker using the following steps: 1. Log in to the administrator account. 2. Disable Unified Write Filter. The thin client restarts. 3. Log in to the administrator account again. 4. Open gpedit.msc using the run command menu. 5. Go to Local Group Policy > Computer Configuration > Administrative Templates > Windows Components > BitLocker Drive Encryption > Operating System Drives > Allow enhanced PINs. The Allow enhanced PINs for startup window is displayed. 6. Select the Enabled option. 7. Click Apply and then click OK. 8. Open gpupdate /force using the run command. 9. Restart the thin client to apply the group policies. Steps 1. Log in to the administrator account. 2. Disable Unified Write Filter. The thin client restarts. 3. Log in to the administrator account again. 4. Uncomment the following lines and update the pin--minimum of six characters--for TPM encryption: If you are using Wyse Management Suite or USB Imaging tool--Go to C: \Windows\Setup\CustomSysprep\Modules\Post_CustomSysprep.psm1 and uncomment the following lines: #cd C:\Windows\setup\Tools\TPM\ #.\TPM_enable.ps1 -pin TC#1234 If you are using System Center Configuration Manager--Go to C: \Windows\Setup\ConfigMgrSysprep\Modules\Admin_ConfigMgrSysprep.psm1 and uncomment the following lines: #cd C:\Windows\setup\Tools\TPM\ #.\TPM_enable.ps1 -pin TC#1234 5. Change the password to an alphanumeric format. 18 Administrative features 6. Go to C:\Windows\Setup. 7. Run Build_master. 8. Run Custom Sysprep if you are using Wyse Management Suite or USB Imaging tool or ConfigMgr Sysprep if you are using System Center Configuration Manager. The thin client automatically turns off. 9. Turn on the thin client and pull the image from the thin client. 10. After the image pull is complete, push the image to the target client. Wait for the execution of first boot scripts and BitLocker encryption to complete. When the Sysprep is completed the target thin client reboots and the TPM is enabled. 11. Enter the BitLocker password and verify the new alphanumeric password. 12. Log in to the administrator account and verify the encryption of the C drive. NOTE: To update the BIOS in BitLocker encryption do the following: a. Copy the BIOS executable file to the USB drive. b. Connect the USB to the respective thin client. c. Right-click the BIOS executable and select Run as administrator. d. Select the Suspend BitLocker Drive Encryption checkbox and then click Update. Thin client reboots and the BIOS is updated. Also the BitLocker is suspended for one reboot. e. Reboot the thin client to ensure that the BitLocker is active. Initialize TPM and enable BitLocker manually Steps 1. Log in to the administrator account. 2. Disable Unified Write Filter. The thin client restarts. 3. Log in to the administrator account again. 4. Open tpm.msc using the run command menu. 5. Verify the TPM status in Trusted Platform Module Management on the thin client. The status should be displayed as The TPM is ready for use. 6. Click Close in Trusted Platform Module Management on the thin client. 7. Open gpedit.msc using the run command menu. 8. Go to Local Group Policy > Computer Configuration > Administrative Templates > Windows Components > BitLocker Drive Encryption > Operating System Drives > Require additional authentication. 9. In the Require additional authentication at startup window select the Enabled option. The Allow BitLocker without a compatible TPM check box is selected by default. 10. Clear the Allow BitLocker without a compatible TPM check box. 11. Click Apply and then click OK. 12. Go to Local Group Policy > Computer Configuration > Administrative Templates > Windows Components > BitLocker Drive Encryption > Operating System Drives > Allow enhanced PINs for startup. 13. In the Allow enhanced PINs for startup window select the Enabled radio button and click Apply. 14. Click OK. 15. Go to Local Group Policy > Computer Configuration > Administrative Templates > Windows Components > BitLocker Drive Encryption > Operating System Drives > Configure TPM platform validation profile for native UEFI firmware Configurations. 16. In the Configure TPM platform validation profile for native UEFI firmware Configurations window select the Enabled radio button and click Apply. 17. Click OK. 18. Open gpupdate /force using the run command. You can also restart the thin client to apply the group policies. 19. Go to Control Panel and click BitLocker Drive Encryption. 20. Click Turn on BitLocker in the Operating system drive section. 21. Select Enter a PIN (recommended) in the BitLocker Drive Encryption (C:) window. Administrative features 19 22. Enter the PIN (alphanumeric characters allowed) using the keyboard and reenter PIN in the BitLocker Encryption Drive (C:) window. 23. Click Set Pin. 24. Select Save to a file in the BitLocker Encryption Drive (C:) window. 25. Click Next. 26. Select the Encrypt entire drive (Slower but best for PCs and drives already in use) option in the BitLocker Encryption Drive (C:) window. 27. Click Next. 28. Select the Run BitLocker system check box and click Continue. 29. Click Restart Now in the BitLocker Drive Encryption window. 30. Enter the pin set in the BitLocker screen to boot to the thin client. 31. Log in to the administrator account. 32. Double-click BitLocker icon in the system tray and check for encryption status of the C: drive. 33. Click Close. 34. Go to This PC and verify that the C: drive is successfully encrypted. Configuring Bluetooth connections You can use your thin client device with other Bluetooth enabled devices, if it has Bluetooth capability. To configure Bluetooth connections, see Connect a Bluetooth device at docs.microsoft.com. NOTE: To retain your settings, disable the Unified Write Filter (UWF) and configure Application Launch Manager and xData Cleanup Manager. For more information, see Before Configuring your thin clients. Configuring wireless local area network settings To configure the wireless local area network settings, use Setup a new connection or network window, if wireless support is allowed on the thin client device. About this task To configure the wireless local area network settings, see Setting up a wireless network at docs.microsoft.com. Using custom fields To enter configuration strings for use by the Wyse Device Manager (WDM) and Wyse Management Suite (WMS), use the Custom Fields dialog box. The configuration strings can contain information such as location, user, administrator, and so on. About this task To enter the information that can be used by the WDM and Wyse Management Suite server, do the following: Steps 1. Log in as an administrator. 2. Go to Start > Dell Thin Client Application. The Dell Thin Client Application window is displayed. 3. On the left navigation bar, click Custom Fields. 4. Enter the custom field information in the custom field boxes, and click Apply. The custom field information is transferred to the Windows registry which is then available to the WDM/WMS server. CAUTION: 20 Administrative features To permanently save the information, ensure that you disable/enable the Unified Write Filter (UWF). For more information, see Before configuring your thin client. NOTE: For details about the custom field information, see the WDM and WMS documentation at www.dell.com/support. Configuring RAM disk size About this task RAM disk is a volatile memory space that is used for temporary data storage. It can also be used for temporary storage of other data according to administrator discretion. For more information, see Saving files and using local drives. The following items are stored on the RAM disk: Browser web page cache Browser history Browser cookies Browser cache Temporary Internet files Print spooling User/system temporary files To configure the RAM disk size, do the following: Steps 1. Log in as an administrator. 2. Go to Start > Dell Thin Client Application. The Dell Thin Client Application window is displayed. 3. On the left navigation bar, click RAM Disk. 4. In the RAM disk size field, type or select the RAM disk size that you want to configure, and then click Apply. If you change the size of the RAM disk, you are prompted to restart the system for the changes to take effect. NOTE: To permanently save the information, disable the Unified Write Filter (UWF). For more information, see Before configuring your thin clients. Enabling auto logon Automatic logon to a user desktop is enabled by default on the thin client device. To enable or disable auto logon, and to change the default user name, password, and domain for a thin client, use the auto logon feature. About this task To enable/disable auto logon: Steps 1. Log in as an administrator. 2. Go to Start > Dell Thin Client Application. The Dell Thin Client Application window is displayed. 3. On the left navigation bar, click Auto Logon. 4. To start with the admin logon page, enter Admin in the Default User Name field. Administrative features 21 NOTE: By default, the Enable Auto Logon check box is selected. 5. If you want to start with the Logon window with default administrator and user selections and other accounts, clear the Enable Auto Logon check box. CAUTION: To permanently save the information, disable/enable the Unified Write Filter (UWF). For more information, see Before configuring your thin clients. NOTE: If auto login is enabled and you log off from your current desktop, the lock screen is displayed. Click anywhere on the lock screen to view the Logon window. Use this window to log in to your preferred administrator or user account. System shortcuts About this task The System shortcuts page allows you to directly access some applications, directory, files, and folders without navigating through the Start menu or control panel. Steps 1. Log in as an administrator. 2. Go to Start > Dell Thin Client Application. The Dell Thin Client Application window is displayed. 3. On the left navigation bar, click System Shortcuts. The following shortcuts are listed in the System Shortcuts area: Administrative Tools All Control Panel Items System Directory Program Files Temporary Folder My Documents Recent Accessed Files Dell Thin Client Application Folder Application Data Folder 4. Click any of the shortcuts to access the respective folders/files/applications. Viewing and configuring SCCM components To view and configure the SCCM components that are installed on your thin client device, use the Configuration Manager Properties dialog box. About this task To open the Configuration Manager Properties dialog box: Steps 1. Log in as an administrator. 2. Go to Start > Control Panel > Configuration Manager. The Configuration Manager Properties dialog box is displayed. 22 Administrative features Next steps For more information about how to use the Configuration Manager Properties dialog box, see Managing Windows-based Dell Wyse Thin Clients using System Center Configuration Manager Administrator's Guide at support.dell.com/manuals. System Center Configuration Manager Client 2016 and 2019 Microsoft System Center Configuration Manager (SCCM) helps you to empower devices and applications which must be productive, while maintaining corporate compliance and control. It accomplishes the corporate compliance and control with a unified infrastructure that gives a single pane of glass to manage physical, virtual, and mobile clients. It also provides tools and improvements that make easier for you to do the jobs. With SP1, it provides integration with Windows Intune to manage PCs and mobile devices, both from the cloud and on-premises, from a single administrative console. For more information, see Managing Windows-based Dell Wyse Thin Clients using System Center Configuration Manager Administrator's Guide at support.dell.com/manuals. Devices and printers To add devices and printers, use the Devices and Printers window. Prerequisites CAUTION: To refrain from cleaning up your settings, disable/enable the Unified Write Filter (UWF) and configure Application Launch Manager and xData Cleanup Manager. About this task To add a device or a printer to the thin client, do the following: Steps 1. Log in as an administrator. 2. Go to Start > Control Panel > Devices and Printers. The Devices and Printers window is displayed. Adding printers About this task To add a printer to the thin client: Steps 1. Click the Devices and Printers icon in Control Panel. The Devices and Printers window is displayed. 2. To open and use the Add a Printer wizard, click Add a Printer. The Add a Printer wizard session starts. A Dell Open Print Driver is installed on the thin client along with other built-in print drivers. To print full text and graphics to a local printer, install the driver provided by the manufacturer according to the instructions. Printing to network printers from Citrix Receiver, Remote Desktop Connection or VMware Horizon Client applications can be achieved through printer drivers on the servers. Printing to a local printer from Citrix Receiver, Remote Desktop Connection or VMware Horizon Client application using the printer drivers of the server produces full text and graphics functionality from the printer. Install the printer driver on the server, and the text only driver on the thin client using the following procedure: a. Click Add a local printer, and click Next. b. Click Use an existing port, select the port from the list, and then click Next. c. Select the manufacturer and model of the printer, and click Next. d. Enter a name for the printer and click Next. Administrative features 23 e. Select Do not share this printer and click Next. f. Select whether to print a test page and click Next. g. Click Finish to complete the installation. A test page will print after installation if this option was selected. Adding devices About this task To add a device to the thin client: Steps 1. Click the Devices and Printers icon in Control Panel and open the Devices and Printers window. 2. To open and use the Add a Device wizard, click Add a Device. The Add a Device wizard session starts. You can use the wizard to add a device of your choice to the thin client. Configuring multi-monitor display You can use the Screen Resolution window to configure dual monitor settings on your dual-monitor capable thin client device. About this task To open the Screen Resolution window, do the following: Steps 1. Log in as an administrator. 2. Go to Start > Control Panel > Display > Change Display Settings. The Screen Resolution window is displayed. For detailed instructions on how to configure the screen resolution, go to www.microsoft.com. For information about setting up multiple monitors, see the How to Set up Multiple Monitors in Windows 10 at support.dell.com. Managing audio and audio devices To manage your audio and audio devices, use the Sound dialog box. About this task To manage audio and audio devices, log in as an administrator, and open the Sound dialog box. Using sound dialog box To manage your audio devices, use the Sound dialog box. About this task To open the Sound dialog box: Steps 1. Go to Start > Control Panel > Sound. The Sound dialog box is displayed. 2. Use the following tabs, and configure the sound related settings: 24 Administrative features Playback--Select a playback device and modify the settings. Recording--Select a recording device and modify the settings. Sounds--Select an existing or modified sound theme for events in Windows or programs. Communications--Click an option to adjust the volume of different sounds when you are using your thin client to place or receive telephone calls. 3. Click Apply, and click OK. NOTE: It is recommended that you use powered speakers. You can also adjust the volume using the Volume icon in the notification area of the taskbar. Additional language support You can add additional languages to your Windows 10 IoT Enterprise operating system. Steps 1. Log in as an administrator. 2. Disable Unified Write Filter. 3. Enable Windows Update by deleting the HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU registry. 4. Restart the thin client. 5. Log in as an administrator. 6. Go to Start > Settings > Time & Language > Region & Language > Add Language. 7. Select the available language pack and click Install. The language pack is displayed in the Region & Language window. 8. Select the language pack and click Options. 9. Click Download and install the language packs. 10. Go to C:\Windows\Setup\Tools. 11. Right-click LanguageConfig.exe and click Run as Administrator. 12. Select the language and click Apply. 13. Restart the device. The device is ready for Golden Image support. Setting region To select your regional formats including keyboard and the Windows display languages, use the Region dialog box. About this task To select your regional formats, do the following: Steps 1. Log in as an administrator. 2. Go to Start > Control Panel > Region. The Region dialog box is displayed. 3. In the Formats tab, select the language, date, and time. To customize the formats, do the following: a. Click Additional Settings. The Customize Format window is displayed. b. Customize the settings, and click OK. Administrative features 25 4. Click Apply, and then click OK. 5. In the Location tab, select a particular location to display additional information such as news and weather. 6. In the Administrative tab, change the language to be displayed in programs that do not support Unicode, and copy the settings. Managing user accounts To manage users and groups, use the User Accounts window. About this task To open the User Accounts window, do the following: Steps 1. Log in as an administrator. 2. Go to Start > Control Panel > User Accounts. For more information about using the User Accounts window, see Managing user and groups with user accounts. Using Windows Defender To scan your computer and protect against spyware and malware, use the Windows Defender dialog box. About this task To open the Windows Defender window, do the following: Steps 1. Log in as an administrator. 2. Go to Start > Control Panel > Windows Defender. The Windows Defender window is displayed. In the Home tab, select a scan option, and click Scan Now. Example To configure and manage your thin client device, you can use anti-malware software settings in the Settings tab. Next steps Windows Defender is anti-spyware software that is included with Windows and runs automatically when you turn on your thin client. Using anti-spyware software, helps you to protect the device against spyware and other potentially unwanted software. Spyware can be installed on your device without your knowledge any time you connect to the internet, and it can infect your computer when you install some programs using a CD, DVD, or other removable media. Spyware can also be programmed to run at unexpected times, not just when it is installed. NOTE: Windows Defender updates automatically at 1:00 AM on second Sunday of every month. Windows Defender Advanced Threat Protection Windows Defender Advanced Threat Protection (ATP) is a new service that helps enterprises to detect, investigate, and respond to advanced attacks on their networks. Windows Defender ATP works with existing Windows security technologies on endpoints, such as Windows Defender, AppLocker, and Device Guard. It also works with third-party security solutions, and anti-malware products. For more information, see the Windows Defender Advanced Threat Protection documentation at docs.microsoft.com 26 Administrative features Threat Defense Dell Data Protection | Threat Defense Agent (powered by Cylance) detects and blocks malware before it can affect your computer. Cylance uses a mathematical approach for malware identification. It uses machine learning techniques instead of reactive signatures, trust-based systems, or sandboxes. Dell Data Protection | Threat Defense analyzes potential file executions for malware in the operating system. Endpoint Security Suite Enterprise The Advanced Threat Prevention element of the Dell Endpoint Security Suite Enterprise version 10.1 is supported. This feature is supported only on Wyse 5070 thin client. Endpoint Security Suite Enterprise provides data security for business data, systems, and reputations. The suite offers an integrated client that includes advanced threat prevention, Enterprise class encryption, all centrally managed through a single console. You can enforce and prove compliance for all endpoints using the consolidated compliance reporting and flexible email notifications. C-A-D tool The C-A-D tool enables administrators to map the Ctrl+Alt+Del key combination of VDI applications to display the Ctrl+Alt+Del screen of the VDI application. If the C-A-D tool is enabled, you can use Ctrl+Alt+Del key combination for all VDI applications. Also, you can use Win+L and Ctrl+Alt+Delete key function in the remote session such as Remote Desktop, Citrix, and VMware sessions. The following are the mapped keys for different VDI applications that are supported by the C-A-D tool: Citrix--Ctrl+F1 RDP--Ctrl+Alt+End VMware--Ctrl+Alt+Insert NOTE: The C-A-D tool does not work for Citrix Virtual Apps and Desktops (formerly Citrix XenDesktop) in a Citrix session, but works only for the Citrix Virtual Apps. The C-A-D tool is enabled by default.. Administrative features 27 Wyse Device Agent Wyse Device Agent (WDA) is a unified agent for all thin client management solutions. Installing WDA on a thin client makes it manageable by Dell Wyse Device Manager (WDM), and Dell Wyse Management Suite (WMS). NOTE: You cannot manage Wyse 5070 thin client using Wyse Device Manager. Citrix HDX RealTime Media Engine Citrix HDX RealTime Optimization Pack for Microsoft Lync provides highly scalable solution for delivering real-time audiovideo conferencing and the VoIP enterprise telephony through Microsoft Lync in the XenDesktop and XenApp environments to users on Linux, Mac, and the Windows devices. HDX RealTime Optimization Pack applies your existing Microsoft Lync infrastructure and inter operates with other Microsoft Lync endpoints running natively on devices. For more information, see Citrix documentation. Viewing and exporting operating system image manifest files About this task Manifest file is an xml document which contains metadata about the operating system image. The current and the factory manifest files can be compared to find change on the thin client. The following are the two types of manifest files that are based on the source of data collection: Table 1. Manifest files Manifest Installed QFE Drivers Source Products Current Yes Manifest Yes Yes Factory Yes Manifest Yes Yes Installed products, QFE, and driver details from current and the factory manifest files can be compared to find the change on the thin client with respect to the installed applications, QFEs, and drivers respectively. NOTE: Installed products refer to all the installed applications on the thin client. Viewing and exporting operating system image current manifest information Steps 1. Log in as an administrator. 2. Go to Start > Control Panel > Dell Wyse Software Manifest Utilty. 3. Click Export Support Data. The data is exported to the default path C:/Users/Public/Public Documents/Wyse. NOTE: You can also export the data to a custom folder by selecting Custom Path and browsing to the required folder. 4. Click Support Directory. The DellTCASupportInfo folder is displayed. 28 Administrative features The support directory contains the applications, drivers, and QFE of current manifest information of the thin client. Viewing operating system image factory manifest information Steps 1. Log in as an administrator. 2. Go to C:\Windows\Setup\Tools. The BuildContent folder contains the factory manifest of the thin client. 3. View the information of the operating system image manifest. To view the information of the installed products in the factory at the time of shipment, go to Apps > InstalledProducts xml file. To view the information of the QFEs installed in the factory at the time of shipment, go to Qfe > QFE xml file. To view the information of the currently installed drivers manifest information, go to Drivers > Drivers xml file. Example NOTE: The InstalledProducts, QFE, and Drivers .xml files generated through the Dell Wyse Software Manifest utility (current manifest information set) and the .xml files present in the <drive C>\Windows\Setup\Tools\BuildContent folder (factory manifest information set) can be compared to find the changes with respect to the installed application and QFEs. You can share the support data and the build content data with the support team during troubleshooting. Administrative features 29 5 Additional administrator utility and settings information This section provides additional information about utilities and settings available for administrators. Automatically launched utilities The following utilities start automatically after you turn on the system, or after you log in to the thin client: Unified Write Filter--After you turn on the system, the Unified Write Filter utility starts automatically. The icon in the notification area of the taskbar indicates the active or inactive status of the Unified Write Filter. For more information, see Using the Unified Write Filter (UWF). NOTE: While the Dell Wyse Write Filter icons and functionality are currently supported, it is recommended that you use the UWF as described in the Microsoft documentation available at www.microsoft.com, and navigate to the Unified Write Filter documentation. Application Launch Manager-- The Application Launch Manager (ALM) version 1.0 enables you to start any application based on pre-defined events such as service startup, user log off or system shutdown in session zero. The application also allows you to configure multi-level logs which is essential for easy troubleshooting. xData Cleanup Manager-- xData Cleanup Manager (xDCM) version 1.0 keeps extraneous information from being stored on the local disk. xDCM can be used to automatically clean-up directories used for temporary caching of information. Clean-up is triggered on either service startup, user logoff, or system shutdown. It does the clean-up invisibly to the user and is completely configurable. VNC Server--After you log in to your thin client, the Windows VNC Server utility starts automatically. VNC allows a thin client desktop to be accessed remotely for administration and support. For more information, see Using Tight VNC to Shadow a thin client. Utilities affected by log off, restart, and shut down The following utilities are affected by logging off, restarting, and shutting down the thin client device: Unified Write Filter--After you turn on the system, the Unified Write Filter utility starts automatically. It is recommended that you use the UWF as described in the Microsoft documentation. For more information, see www.microsoft.com, and navigate to the Unified Write Filter documentation. Application Launch Manager-- The Application Launch Manager (ALM) version 1.0 enables you to start any application based on pre-defined events such as service startup, user log off or system shutdown in session zero. The application also allows you to configure multi-level logs which is essential for easy troubleshooting. xData Cleanup Manager-- xData Cleanup Manager (xDCM) version 1.0 keeps extraneous information from being stored on the local disk. xDCM can be used to automatically clean-up directories used for temporary caching of information. Clean-up is triggered on either service startup, user logoff, or system shutdown. It does the clean-up invisibly to the user and is completely configurable. Power Management--A Monitor Saver turns off the video signal to the monitor, allowing the monitor to enter a powersaving mode after a designated idle time. To access the power settings, go to Start > Control Panel > Power Options. Wake-on-LAN--This feature discovers all thin clients connected to your LAN, and enables you to wake them by clicking a button. For example, to perform image updates and remote administration functions on devices that have been shut down or are on standby. To use this feature, the thin client power must be turned on. 30 Additional administrator utility and settings information Unified Write Filter About this task Unified Write Filter (UWF) is a sector-based write filter that protects your storage media. UWF redirects the write attempts to a virtual overlay, and intercepts the write attempts to the protected volume. This improves the stability, reliability of the device thereby reducing the wear on write media, such as solid-state drives. In UWF, overlay is a virtual storage space that saves changes made on the protected volume. If the file system attempts to modify a protected sector, UWF will copy the sector from the protected volume to the overlay, and the overlay is updated. If an application tries to read from that sector, UWF returns the data from the overlay, so that the system appears to have written to the volume, while the volume remains unchanged.For more information, see the Unified Write Filter documentation at www.microsoft.com. CAUTION: Failure to keep the Write Filter turned on (except for regular maintenance or Application/Driver installs or upgrades) will prematurely wear out your Flash/SSD storage and invalidate your warranty. Next steps The following are the default file folders excluded from being filtered by UWF: C:\Users\Admin\AppData\LocalLow C:\Users\User\AppData\LocalLow C:\Program Files\Windows Defender C:\Program Files (x86)\Windows Defender C:\Windows\WindowsUpdate.log C:\Windows\Temp\MpCmdRun.log C:\Windows\system32\spp C:\ProgramData\Microsoft\Windows Defender C:\program files\Wyse\WDA\Config C:\Users\Public\Documents\Wyse C:\Wyse\WCM\ConfigMgmt C:\Wyse\WCM C:\Wyse\WDA The following are the default registries excluded from being filtered by UWF: HKLM\SYSTEM\CurrentControlSet\Control\WNT\DWCADTool HKLM\Software\Wyse\ConfigMgmt HKLM\SOFTWARE\Microsoft\Windows Defender HKLM\SYSTEM\CurrentControlSet\Control\WNT\UWFSvc HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\HomeGroup HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList HKLM\SYSTEM\WPA CAUTION: Please follow proper write filter and Windows Page File usage instructions at all times. Such instructions include making sure that the write filter is enabled during regular use and is disabled only temporarily by an administrator when required for image upgrades, applying security patches, registry changes and application installation. The write filter should be re-enabled as soon as such tasks are completed. Such instructions further include never enabling the Windows Page File feature during regular use of the thin client. Any operation of a Dell Wyse Windows Embedded Thin Client with the write filter turned off during regular use and/or with the Windows Page file enabled will prematurely wear out your Flash/SSD storage, decrease performance and decrease the lifespan of the product. Dell is not responsible for, and will not, warrant, support, repair or replace any thin client device or component that fails to operate properly due to a failure to follow these instructions. Additional administrator utility and settings information 31 Using Unified Write Filter About this task To configure thin client devices using UWF, do the following: Steps 1. Log in as an administrator. If automatic login to a user desktop is enabled, log off from the user desktop and log in as an administrator. 2. To disable the Unified Write Filter, double-click the Dell Wyse WF Disable icon on the desktop. This icon disables the filter and reboots the system. 3. Configure the thin client device as per your requirements. 4. After you configure the thin client device, to enable the Unified Write Filter, double-click the Dell Wyse WF Enable icon on the desktop. This icon enables the filter and reboots the system. Your configurations on the thin client device are now saved, and they persist after you reboot the thin client. Next steps After system start-up, the Unified Write Filter (UWF) utility starts automatically. You can add specific files or folders on a protected volume to a file exclusion list to exclude those files and folders from being filtered by UWF. When a file or folder is in the exclusion list for a volume, all writes to that file or folder bypass UWF filtering, and are written directly to the protected volume and persist after the device restarts. You must log in as an administrator to add or remove file or folder exclusions during run time, and you must restart the device for new exclusions to take effect. Running Unified Write Filter commandline options There are several command lines you can use to control the Unified Write Filter. Commandline arguments cannot be combined. Use the following guidelines for the commandline option for the Unified Write Filter. You can also use the commands if you open the command prompt window with elevated privilege by entering command in the Run box. Table 2. Running Unified Write Filter commandline options Command-line options Description uwfmgr This command-line tool configures and retrieves settings for Unified Write Filter (UWF). If there are no command-line options available, it displays the command help. uwfmgr filter enable This command-line enables the Unified Write Filter after the next system restart. The Unified Write Filter status icon is green when the Unified Write Filter is enabled. uwfmgr filter disable This command-line option disables the Unified Write Filter after the next system restart. The Unified Write Filter status icon remains red while disabled. uwfmgr file commit C: <file_path> This command-line commits changes to a specified file to overlay for a Unified Write Filter-protected volume. Administrator-level permissions are required to use this command. The <file> parameter must be fully qualified, including the volume and path. uwfmgr.exe uses the volume specified in the <file> parameter to determine which volume contains the file exclusion list for the file. There is a single space between volume name and file_path. For example, to commit a file C:\Program Files\temp.txt the command would be uwfmgr commit C: \Program Files\temp.txt. 32 Additional administrator utility and settings information Table 2. Running Unified Write Filter commandline options Command-line options Description uwfmgr file add-exclusion C: <file_or_dir_path> This command-line adds the specified file to the file exclusion list of the volume protected by Unified Write Filter. Unified Write Filter starts excluding the file from filtering after the next system restart. For example, to add a registry directory HKLM\SYSTEM\WPA, the command is UWFmgr.exe registry addexclusion HKLM\SYSTEM\WPA. uwfmgr file remove-exclusion C: <file_or_dir_path> This command-line removes the specified file from the file exclusion list of the volume protected by Unified Write Filter. Unified Write Filter stops excluding the file from filtering after the next system restart. uwfmgr overlay get-config This command-line displays configuration settings for the Unified Write Filter overlay. Displays information for both the current and the next session. uwfmgr registry /? This command-line displays configuration settings for exclusions of registry keys. NOTE: If you open a command prompt window and enter uwfmgr ? or uwfmgr help, all available commands are displayed. For information on a command, use uwfmgr help <command>. For example, for information on the command, volume, enter uwfmgr help volume. CAUTION: Administrators should use file security to prevent unwanted usage of these commands. Do not attempt to flush the data to the disk while another flush operation is in progress. Enabling and disabling the Write Filter using the desktop icons The Unified Write Filter can also be enabled or disabled using the Write Filter Enable/Disable desktop icons. The icon in the notification area of the taskbar indicates the active or inactive status of the Unified Write Filter by the colors green and red respectively. Dell Wyse WF Enable Icon (Green)--Double-clicking this icon enables the Unified Write Filter. This utility is similar to running the uwfmgr filter enable command-line. However, double-clicking this icon immediately restarts the system and enables the Unified Write Filter. The Unified Write Filter status icon in the notification area of the taskbar is green when the Unified Write Filter is enabled. Dell Wyse WF Disable Icon(Red)--Double-clicking this icon disables the Unified Write Filter. This utility is similar to running the uwfmgr filter disable command-line option. However, double-clicking this icon restarts the system immediately. The Unified Write Filter status icon in the notification area of the taskbar remains red if the Unified Write Filter is disabled. Setting Write Filter controls To view and manage UWF control settings, use the Unified Write Filter Control dialog box. To open the dialog box, doubleclick the UWF icon in the notification area of the administrator taskbar. When you configure UWF control settings, some of the fields are unavailable. You can select from the list of available fields during configuration. The Dell Wyse Unified Write Filter Control dialog box includes the following: UWF status Current Status--Shows the status of the Unified Write Filter. The status may either be Enabled or Disabled. Additional administrator utility and settings information 33 Boot Command--Shows the status of the Boot Command. UWF_ENABLE means that the UWF is enabled for the next session; and UWF_DISABLE means that the UWF is disabled for the next session. RAM used by UWF--Shows the amount of RAM allocated to the Unified Write Filter in Mega bytes (MB) and Percentage. If Current Status is disabled, RAM allocated to UWF is always zero (0). Amount of RAM used for UWF Cache--Shows the amount of RAM allocated to the Unified Write Filter cache for the current session in Megabytes (MB). Warning #1 (%)--Shows the UWF cache percentage value at which a Low Memory warning message is displayed to the user for the current session. Warning #2 (%)--Shows the UWF cache percentage value at which a Critical Memory warning message is displayed to the user. UWF Cache settings Amount of RAM to be used for UWF Cache--Shows the amount of RAM that is to be used as the Unified Write Filter cache for the next session in MB. This value should be in the range of 256 MB to 2048 MB. There is an extra check to ensure that this value does not exceed 50% of Total Available RAM. UWF Warning settings Warning #1 (%)--Shows the UWF cache percentage value at which a Low Memory warning message is displayed to the user (Default value = 80, Minimum value = 50, Maximum value = 80). Warning #2 (%)--Shows the UWF cache percentage value at which a Critical Memory warning message is displayed to the user. Once the memory level crosses the warning level 2, system automatically restarts. (Default value = 90, Minimum value = 55, Maximum value = 90) Enable UWF--Allows you to enable the Unified Write Filter and prompts you to restart the thin client device. To save the changes, restart the thin client. After the system restarts to enable the Unified Write Filter, the Unified Write Filter status icon in the desktop notification area turns green. Disable UWF--Allows you to disable the Unified Write Filter and prompts you to restart the thin client device. To save the changes, restart the thin client. After disabling the Unified Write Filter, the Unified Write Filter status icon in the desktop notification area turns red and the Unified Write Filter remains disabled after the system restarts. Defaults--Allows you to reset the UWF Cache Settings area, and the UWF Warning Settings area to their default values. File Commit area File Path--Allows you to add, remove, and commit files to the underlying media. The system does not restart the thin client device. The changes are committed immediately. NOTE: Delete a file path from the list, if the file is not committed. Current Session Exclusion List File/Directory Path-- Allows you to add and remove a file or directory, to or from the exclusion list for the next session. This retrieves the list of files or directories that are written through in the current session and the title of the pane is shown as Current Session Exclusion List. The Next Session retrieves the list of files or directories that are written through for the next session and the title of the pane is shown as Next Session Exclusion List. The system will not restart the thin client, and the changes are not committed until an administrator restarts the thin client device manually. Application Launch Manager The Application Launch Manager (ALM) version 1.0 enables you to start an application that is based on predefined events such as service startup, user login/logoff, or system shutdown in system account. You can also configure multilevel logs which are essential for troubleshooting using the DebugLog.xml file. You can add or remove application configuration nodes from the ALM configuration file using the command-line interface. 34 Additional administrator utility and settings information ALM CLI tool You can use the ALM CLI tool to add or remove application configuration nodes from ALM configuration file ApplicationLaunchConfig.xml. This tool is available at the installation path of the ALM application. By default, the tool is available at %systemdrive%\Program Files\ALM. Configuration of nodes using ALM You can use the following options and parameters to configure application nodes in ApplicationLaunchConfig.xml: Table 3. Options to configure nodes Option Add -Application Remove -Application Description Option to add an application node. Option to delete an application node. Table 4. Parameters to configure nodes Parameter Name:<name of the application> Path:<path of the application> Arguments:< specify the configuration information when the application is launched> Event:<event to execute the command> Values [Application name] [Application path] [Argument] USER_LOGOFF SVC_STARTUP ON_SHUTDOWN USER_LOGIN Examples to configure nodes using xDCM Table 5. Examples to configure nodes using xDCM Scenario Adding an application node that is used by ClientServiceEngine service to run the TestApp.exe file with an argument -t when you log off from the system. Deleting an application node from ExampleApp application. Command ALM.exe -Add -Application -Name:ExampleApp -Path:C:\Windows\System32\TestApp.exe Arguments:"-t" -Event: USER_LOGOFF ALM.exe -Remove -Application -Name: ExampleApp NOTE: You must provide unique names to add a new application entry to the ApplicationLaunchConfig.xml using ALM.exe. Only three execution event values USER_LOGOFF, SVC_STARTUP, and ON_SHUTDOWN, are supported in the ALM application. You can add only one of these values to each event. xData Cleanup Manager xData Cleanup Manager (xDCM) version 1.0 prevents extraneous information from being stored on the local disk. xDCM can be used to automatically clean up directories used to temporarily cache the information. A clean up is triggered on either service startup, user logoff, or system shutdown. Additional administrator utility and settings information 35 It also enables you to configure multilevel logs which are essential for troubleshooting. You can clean up files, folders, and enable or disable xDCM using Application Programming Interface (API). You can also add or remove configuration nodes from the xDCM configuration file using command-line interface. NOTE: Existing NetXclean.ini configurations are ported to new xDataCleanupConfig.xml. Content in the xData Cleanup Manager are cleaned by default. xDCM CLI tool You can use the xDCM CLI tool to add or remove configuration nodes from xDCM configuration file XdataCleanupConfig.xml. This tool is available at the installation path of the xDCM application. By default, the tool is available at %systemdrive%\Program Files\XDCM. Configuration of nodes using xDCM You can use the following options and parameters to configure application nodes in XdataCleanupConfig.xml: Table 6. Options to configure nodes Option Add Description Option to add a folder cleanup node. Remove Option to delete a folder cleanup node. Table 7. Parameters to configure nodes Parameter CleanupType:<type of the clean up node> Name:<name of the clean up node> Path:<path of the clean up node> PathExclusions:<paths to be excluded from deletion (Path1,Path2)/NULL> Event:<event to execute the command> CleanType:<type of clean up> CleanFrom:<type of memory> Values Folder File Registry [Folder/File/Registry name] [Folder/File/Registry path] [Path/NULL] USER_LOGOFF SVC_STARTUP ON_SHUTDOWN DIR_DELETE DIR_EMPTY Disk Overlay Examples to configure nodes using xDCM Table 8. Examples to configure nodes using xDCM Scenario Adding a folder cleanup node in XdataCleanupConfig.xml under DiskCleanup element. Command XDCM.exe -Add CleanupType:Folder -Name:Notepad Path:C:\Windows\Security -PathExclusions:"C: 36 Additional administrator utility and settings information Table 8. Examples to configure nodes using xDCM (continued) Scenario Command \Windows\Security\database, C:\Windows\logs" -Event: USER_LOGOFF -CleanType:DIR_EMPTY CleanFrom:Disk Deleting a file cleanup node under OverlayCleanup element XDCM.exe -Remove -CleanupType:File - Notepad in XdataCleanupConfig.xml. Name:Notepad -CleanFrom:Overlay NOTE: If you log off from the thin client when UWF is disabled, the folder cleanup node is used by ClientServiceEngine service to clean up the contents inside the directory C:\Windows\Security. Also, when the contents of this directory is deleted, the contents in the folders C:\Windows\Security\database and C:\Windows\logs are deleted as they are added in the excluded paths. You must provide unique names to add a new application entry to the XdataCleanupConfig.xml using XDCM.exe. When you are running the command to add an entry, the folder path is compared with the existing entries. If the path is already available, only the exclusion paths are added to the existing folder entry. Capturing logfiles You can configure DebugLog.xml file to collect different types of logs for an application. You can modify the log levels to obtain specific type of logs. The logs files are created at C:\Windows\Logs\<Application name>\Logs. NOTE: By default, no logs are created for an application. Configuration of DebugLog XML file You can use the Debug Configuration Editor (DCE) console application to configure the debug configuration XML file. This tool can be used to commit, exclude, or modify the debug configuration file. To commit, exclude, or modify the debug configuration file, enter the following commands on the Debug Configuration Editor: To commit the file and obtain the logfiles--DebugConfigEditor.exe -CommitLog -Path "DebugLog.xml". This command commits the file present in the path that is mentioned in Debug.xml. To exclude the collection of logs from a folder mentioned in the Debug.xml--DebugConfigEditor.exe ExcludeLog -Path "DebugLog.xml". To configure the Debug.xml file to collect different types of logs--DebugConfigEditor.exe -UpdateConfig Path "DebugLog.xml" -LogPath "Path of Log File" -LogFileName "Name of log File" -LogLevel "logLevel". The following table describes the different LogLevel values that can be used: Table 9. LogLevel values Value Description 0 Logs are not captured. 1 Error logs are captured. 2 Warning logs are captured. 3 Error and warning logs are captured. 4 Information logs are captured. 7 All logs are captured. Additional administrator utility and settings information 37 Saving files and using local drives Thin clients use an embedded operating system with a fixed amount of disk space. It is recommended that you to save files that you want to keep on a server rather than on a thin client. CAUTION: Be careful of application settings that write to the drive C, which resides in disk space. By default, these applications write cache files to the drive C on the local system. If you must write to a local drive, change the application settings to use the drive Z. The default configuration settings that are mentioned in Managing Users and Groups with User Accounts minimize writing to the drive C for factory-installed applications. drive Z Drive Z is the on-board volatile memory (Dell Wyse RAM Disk) of the thin client. It is recommended that you do not use this drive to save data that you want to retain. For information about using the Z drive with roaming profiles, see Participating in domains. drive C Drive C is the on-board non-volatile flash memory. It is recommended that you avoid writing to drive C. Writing to drive C reduces the free disk space. If the free disk space on drive C is reduced under 500 MB, the thin client becomes unstable. NOTE: It is recommended that 500 MB of disk space is left unused. If the free disk space is reduced to 500 MB, the thin client image is irreparably damaged and it is necessary for you to contact an authorized service center to repair the thin client. Enabling the Unified Write Filter protects the disk from damage and presents an error message if the cache is overwritten. However, if this message occurs you are unable to flush files of the Unified Write Filter cache and any thin client configuration changes still in cache is lost. Items that are written to the Unified Write Filter cache or directly to the disk if the Unified Write Filter is disabled during normal operations include: Favorites Created connections Delete/edit connections Mapping network drives About this task Administrators can map network drives. To map the network drive and retain the mappings after the thin client device is restarted, see Map a network drive at https://support.microsoft.com. Participating in domains You can participate in domains by joining the thin client device to a domain or by using roaming profiles. About this task To join a domain, see Steps 1. Log in as an administrator. 2. Go to Start > Control Panel > System. The System window is displayed. 3. In the Computer name, domain and workgroup settings section, click Change Settings. The System Properties dialog box is displayed. 4. Click Change option to change the domain or workgroup. a. Click Domain. The Computer Name/Domain Changes dialog box is displayed. 38 Additional administrator utility and settings information b. Enter the domain of your choice. c. Click OK. 5. To join a thin client device to a domain, click Network ID. The Join a Domain or Workgroup wizard is displayed. On the first page of the wizard, select the option that describes your network. Business Network--Click this option if your thin client is a part of business network and you use it to connect to other clients at work. a. Click Next. b. Select the option according to your company's network availability on a domain. If you select the option Network with a domain, then enter the following information: User name Password Domain name If you select the option Network without a domain, then enter Workgroup, and then click Next. NOTE: You can click Next even if you do not know the workgroup name. c. To apply the changes, you must restart the computer. Click Finish. NOTE: Before restarting your computer, save any open files and close all programs. Home Network--Click this option if your thin client is a home client and it is not a part of a business network. To apply the changes, you must restart the computer. Click Finish. CAUTION: Exercise caution when joining the thin client device to a domain as the profile that is downloaded at logon could overflow the cache or flash memory. When adding the thin client device to a domain, the Unified Write Filter should be disabled so that the domain information can be permanently stored on the thin client device. The Unified Write Filter should remain disabled through the next restart as information is written to the thin client on the restart after joining the domain. This UWF is important when joining an Active Directory domain. For details on disabling and enabling the Unified Write Filter, see Before configuring your thin clients. To make the domain changes permanent, complete the following: a. Disable the Unified Write Filter. b. Join the domain. c. Restart the thin client. d. Enable the Unified Write Filter. NOTE: If you use the Write Filter Enable icon to enable the Write Filter, the thin client restarts automatically. Next steps Using Roaming Profiles You can participate in domains by writing roaming profiles to the C drive. The profiles must be limited in size, and it is not retained when the thin client device is restarted. For successful downloading and proper functioning, there must be sufficient disk space available for roaming profiles. Sometimes, it may be necessary to remove software components to free space for roaming profiles. Using the Net and Tracert utilities Net and Tracert utilities are available for administrative use. For example, determining the route took by packets across an IP network. For more information on these utilities, go to www.microsoft.com. Additional administrator utility and settings information 39 Managing Users and Groups with User Accounts To create and manage user accounts and groups, and configure advanced user profile properties, use the User Accounts window. By default, a new user is only a member of the Users group and is not locked down. As an administrator, you can select the attributes and profile settings for users. This section provides quick-start guidelines on: Creating User Accounts Editing User Accounts Configuring User Profiles NOTE: For detailed information on using the User Accounts window, click the Help icon and examples links provided throughout the wizards. For example, you can use the Windows Help and Support window to search for items such as user profiles and user groups. Obtain links to detailed steps on creating and managing these items. Creating user accounts Only administrators can create user accounts locally or remotely through VNC. However, due to local flash or disk space constraints, the number of additional users on the thin client device should be kept minimum. About this task CAUTION: To permanently save the information, ensure that you disable the Unified Write Filter (UWF). Steps 1. Log in as an administrator. 2. Go to Start > Control Panel > User Accounts. 3. On the User Accounts window, click Manage another account. The Manage Accounts window is displayed. 4. Click Add new user in PC settings. The PC settings wizard starts. Use this wizard to create a user account. 5. After creating the standard users and administrators, these users will appear in the Manage Accounts window. See Step 3. Editing user accounts Prerequisites Open the User Accounts window as described in Managing user accounts. About this task To edit the default settings of a standard user or administrator account: Steps 1. On the User Accounts window, click Manage another account. The Manage Accounts window is displayed. 2. To change as required, select User. The Change an Account window is displayed. Now make the wanted changes using the links that are provided. Configuring user profiles Prerequisites Open the User Accounts window as described in Managing user accounts. 40 Additional administrator utility and settings information About this task CAUTION: By default, all application settings are set to cache to C drive. It is recommended that you cache to the RAM Disk Z drive as is preset in the account profiles to avoid overflowing the Unified Write Filter cache. It is recommended that other applications available to new and existing users be configured to prevent writing to the local file system because of the limited size of the disk space. It is recommended that care be exercised when changing configuration settings of the factory-installed applications. To configure the default admin and user profiles stored on the thin client: Steps 1. On the User Accounts window, click Configure Advanced User Profile Properties. The User Profiles dialog box is displayed. 2. Use the command buttons such as Change Type, Delete, and Copy to as described in the Microsoft documentation provided throughout the wizards. Changing the computer name of a thin client Administrators can change the computer name of a thin client. The computer name information and the Terminal Services Client Access License (TSCAL) are preserved regardless of the Unified Write Filter state (enabled or disabled). This maintains the specific computer identity information and facilitates the image management of the thin client. About this task To change the computer name of a thin client device, see Steps 1. Log in as an administrator. 2. Go to Start > Control Panel > System. The System window is displayed. 3. In the Computer name, domain, and workgroup settings section, click Change Settings. The System Properties dialog box is displayed. 4. Click Change to rename the computer name. 5. In the Computer Name window, type the name for the thin client device in the Computer name field, and click OK. 6. In the Confirmation dialog box, click OK to restart for applying the changes. 7. Click Close, and then click Restart Now to apply the changes. Removing language and feature on demand packages Prerequisites Perform the following steps to remove language and feature on demand packages: NOTE: These steps must be performed from the admin account with the Unified Write Filter disabled. Steps 1. Start a command prompt with administrator privileges. 2. Run the following command:dism /online /get-packages | find /I "Client-Language". 3. See Language Code table to identify the languages installed. 4. Once a language has been identified, find all the associated packages with that language. 5. Run dism /online /get-packages | find /I "<Language Abbreviation>" 6. Run the following commands to remove all French-language feature packages: Additional administrator utility and settings information 41 dism /online /remove-package /packagename:"Microsoft-Windows-LanguageFeatures-Speech-frfr-Package~31bf3856ad364e35~amd64~~10.0.14393.0" /norestart dism /online /remove-package /packagename:"Microsoft-Windows-LanguageFeaturesTextToSpeech-fr-fr-Package~31bf3856ad364e35~amd64~~10.0.14393.0" /norestart dism /online /remove-package /packagename:"Microsoft-Windows-LanguageFeatures-OCR-fr-frPackage~31bf3856ad364e35~amd64~~10.0.14393.0" /norestart dism /online /remove-package /packagename:"Microsoft-Windows-LanguageFeaturesHandwriting-fr-fr-Package~31bf3856ad364e35~amd64~~10.0.14393.0" /norestart dism /online /remove-package /packagename:"Microsoft-Windows-LanguageFeatures-Basic-frfr-Package~31bf3856ad364e35~amd64~~10.0.14393.0" /norestart NOTE: Not all the languages include the LanguageFeatures-Speech package. If the selected language includes the LanguageFeatures-Speech package, then that package must be removed. NOTE: Double byte character languages (Chinese Simplified, Chinese Traditional, Japanese, and Korean) include the following Feature On Demand packages that must be removed, if the following languages are removed from the system: Chinese Simplified Microsoft-Windows-LanguageFeatures-Fonts-HansPackage~31bf3856ad364e35~amd64~~10.0.14393.0 Chinese Traditional Microsoft-Windows-LanguageFeatures-Fonts-HantPackage~31bf3856ad364e35~amd64~~10.0.14393.0 Microsoft-Windows-InternationalFeatures-TaiwanPackage~31bf3856ad364e35~amd64~~10.0.14393.0 Japanese Microsoft-Windows-LanguageFeatures-Fonts-JpanPackage~31bf3856ad364e35~amd64~~10.0.14393.0 Korean Microsoft-Windows-LanguageFeatures-Fonts-KorePackage~31bf3856ad364e35~amd64~~10.0.14393.0 These packages are not dependent on any other packages, hence these can be removed at any time. NOTE: You must remove the LanguageFeatures-Basic package. NOTE: A list of supported Windows 10 IoT Enterprise Language packages are found in the following table Windows 10 IoT Enterprise Language Packages. 7. Once the LanguageFeature packages are removed, remove the Client-LanguagePack. start /b /wait dism /online /remove-package /packagename:"Microsoft-Windows-ClientLanguagePack-Package~31bf3856ad364e35~amd64~fr-FR~10.0.14393.0" /norestart 8. Repeat the steps to remove all the unused languages from the system. 9. After removing the unused languages, reboot the system. 10. After the system reboots, log in into the admin account and run the OSComponentCleanup utility. 11. Enable Unified Write Filter. 42 Additional administrator utility and settings information Language codes Following are the list of language codes: Table 10. Language codes Language English Chinese Simplified Chinese Traditional Danish Dutch Finnish French French Canadian German Italian Japanese Korean Norwegian Portuguese Brazilian Russian Spanish Swedish Abbreviation EN-US ZH-CN ZH-TW DA-DK NL-NL FI-FI FR-FR FR-CA DE-DE IT-IT JA-JP KO-KR NB-NO PT-BR RU-RU ES-ES SV-SE Adding languages to LTSC 2019 (RS5) Prerequisites These steps must be performed from the admin account with the Unified Write Filter disabled. A network connection is required to install localized language packages from Microsoft. Steps 1. Open the Windows Settings and click Time & Language. 2. In the left pane, click Language. 3. Under Preferred languages, click Add a language. 4. In the search field, type the required language that must be added to the system and select the language, and then click Next. 5. Click Install. The installed language is set as the display language to the next sign in. NOTE: The display language can be changed from the Windows display language drop-down menu. 6. Verify all the installed language packages before proceeding. NOTE: Verifying the installed packages may take several minutes and are dependent upon the number of languages that are installed in the system. Also, it depends on the network bandwidth and the response time from Microsoft source installation servers. Additional administrator utility and settings information 43 7. To verify all the packages that are installed, open a command prompt with administrator privileges, and run the following commands. Only proceed when all Client-LanguagePackages are displayed along with the language specific feature on demand packages for SNMP components. dism /online /get-packages | find /i "-Language" dism /online /get-packages | find /i "SNMP" 8. Remove Language Experience appx packages. NOTE: If you do not remove Language Experience appx packages, an error is displayed when the Windows Sysprep is performed. 9. Open PowerShell, run Get-AppxPackage -AllUsers "*LanguageExperience*" | Remove-AppxPackage command. 10. Verify all the language experience appx packages have been removed by running Get-AppxPackage -AllUsers "*LanguageExperience*" command. This command returns no output. 11. If an added language needs to be removed: a. Follow step 1 to 7 from the section Remove Language and Feature on Demand Packages. b. After completing step 7, go to Windows Settings > Time & Language > Language. c. Select the languages that must be removed and click Remove. 12. After the required languages are installed and the language experience appx packages have been removed, install the latest Microsoft Cumulative Update to ensure that the newly installed language resource files are patched. 13. Once the latest Microsoft Cumulative Update is applied to the system, run OSComponentCleanup command and enable the Unified Write Filter to return to standard procedure. Windows 10 IoT enterprise language packages These are the list of supported localized language packages on Wyse Windows Thin Client systems: Table 11. English Language packages Microsoft-Windows-Client-LanguagePack-Package-en-US Microsoft-Windows-LanguageFeatures-Basic-en-us-Package Microsoft-Windows-LanguageFeatures-Handwriting-en-us-Package Microsoft-Windows-LanguageFeatures-OCR-en-us-Package Microsoft-Windows-LanguageFeatures-Speech-en-us-Package Microsoft-Windows-LanguageFeatures-TextToSpeech-en-us-Package Table 12. Chinese Simplified Language packages Microsoft-Windows-Client-LanguagePack-Package-zh-CN Microsoft-Windows-LanguageFeatures-Basic-zh-cn-Package Microsoft-Windows-LanguageFeatures-Handwriting-zh-cn-Package Microsoft-Windows-LanguageFeatures-OCR-zh-cn-Package Microsoft-Windows-LanguageFeatures-Speech-zh-cn-Package Microsoft-Windows-LanguageFeatures-TextToSpeech-zh-cn-Package Microsoft-Windows-LanguageFeatures-Fonts-Hans-Package Table 13. Chinese Traditional 44 Additional administrator utility and settings information Table 13. Chinese Traditional Language packages Microsoft-Windows-Client-LanguagePack-Package-zh-TW Microsoft-Windows-LanguageFeatures-Basic-zh-tw-Package Microsoft-Windows-LanguageFeatures-Handwriting-zh-tw-Package Microsoft-Windows-LanguageFeatures-OCR-zh-tw-Package Microsoft-Windows-LanguageFeatures-Speech-zh-tw-Package Microsoft-Windows-LanguageFeatures-TextToSpeech-zh-tw-Package Microsoft-Windows-LanguageFeatures-Fonts-Hant-Package Microsoft-Windows-InternationalFeatures-Taiwan-Package Table 14. Danish Language packages Microsoft-Windows-Client-LanguagePack-Package-da-DK Microsoft-Windows-LanguageFeatures-Basic-da-dk-Package Microsoft-Windows-LanguageFeatures-Handwriting-da-dk-Package Microsoft-Windows-LanguageFeatures-OCR-da-dk-Package Microsoft-Windows-LanguageFeatures-TextToSpeech-da-dk-Package Table 15. Dutch Language packages Microsoft-Windows-Client-LanguagePack-Package-nl-NL Microsoft-Windows-LanguageFeatures-Basic-nl-nl-Package Microsoft-Windows-LanguageFeatures-Handwriting-nl-nl-Package Microsoft-Windows-LanguageFeatures-OCR-nl-nl-Package Microsoft-Windows-LanguageFeatures-TextToSpeech-nl-nl-Package Table 16. Finnish Language packages Microsoft-Windows-Client-LanguagePack-Package-fi-FI Microsoft-Windows-LanguageFeatures-Basic-fi-fi-Package Microsoft-Windows-LanguageFeatures-Handwriting-fi-fi-Package Microsoft-Windows-LanguageFeatures-OCR-fi-fi-Package Microsoft-Windows-LanguageFeatures-TextToSpeech-fi-fi-Package Table 17. French Language packages Microsoft-Windows-Client-LanguagePack-Package-fr-FR Microsoft-Windows-LanguageFeatures-Basic-fr-fr-Package Microsoft-Windows-LanguageFeatures-Handwriting-fr-fr-Package Microsoft-Windows-LanguageFeatures-OCR-fr-fr-Package Microsoft-Windows-LanguageFeatures-Speech-fr-fr-Package Additional administrator utility and settings information 45 Table 17. French Language packages Microsoft-Windows-LanguageFeatures-TextToSpeech-fr-fr-Package Table 18. French Canadian Language packages Microsoft-Windows-Client-LanguagePack-Package-fr-CA Microsoft-Windows-LanguageFeatures-Basic-fr-ca-Package Microsoft-Windows-LanguageFeatures-OCR-fr-ca-Package Microsoft-Windows-LanguageFeatures-Speech-fr-ca-Package Microsoft-Windows-LanguageFeatures-TextToSpeech-fr-ca-Package Table 19. German Language packages Microsoft-Windows-Client-LanguagePack-Package-de-DE Microsoft-Windows-LanguageFeatures-Basic-de-de-Package Microsoft-Windows-LanguageFeatures-Handwriting-de-de-Package Microsoft-Windows-LanguageFeatures-OCR-de-de-Package Microsoft-Windows-LanguageFeatures-Speech-de-de-Package Microsoft-Windows-LanguageFeatures-TextToSpeech-de-de-Package Table 20. Italian Language packages Microsoft-Windows-Client-LanguagePack-Package-it-IT Microsoft-Windows-LanguageFeatures-Basic-it-it-Package Microsoft-Windows-LanguageFeatures-Handwriting-it-it-Package Microsoft-Windows-LanguageFeatures-OCR-it-it-Package Microsoft-Windows-LanguageFeatures-Speech-it-it-Package Microsoft-Windows-LanguageFeatures-TextToSpeech-it-it-Package Table 21. Japanese Language packages Microsoft-Windows-Client-LanguagePack-Package-ja-JP Microsoft-Windows-LanguageFeatures-Basic-ja-jp-Package Microsoft-Windows-LanguageFeatures-Handwriting-ja-jp-Package Microsoft-Windows-LanguageFeatures-OCR-ja-jp-Package Microsoft-Windows-LanguageFeatures-Speech-ja-jp-Package Microsoft-Windows-LanguageFeatures-TextToSpeech-ja-jp-Package Microsoft-Windows-LanguageFeatures-Fonts-Jpan-Package Table 22. Korean Language packages Microsoft-Windows-Client-LanguagePack-Package-ko-KR 46 Additional administrator utility and settings information Table 22. Korean Language packages Microsoft-Windows-LanguageFeatures-Basic-ko-kr-Package Microsoft-Windows-LanguageFeatures-Handwriting-ko-kr-Package Microsoft-Windows-LanguageFeatures-OCR-ko-kr-Package Microsoft-Windows-LanguageFeatures-TextToSpeech-ko-kr-Package Microsoft-Windows-LanguageFeatures-Fonts-Kore-Package Table 23. Norwegian Language packages Microsoft-Windows-Client-LanguagePack-Package-nb-NO Microsoft-Windows-LanguageFeatures-Basic-nb-no-Package Microsoft-Windows-LanguageFeatures-Handwriting-nb-no-Package Microsoft-Windows-LanguageFeatures-OCR-nb-no-Package Microsoft-Windows-LanguageFeatures-TextToSpeech-nb-no-Package Table 24. Portuguese Brazilian Language packages Microsoft-Windows-Client-LanguagePack-Package-pt-BR Microsoft-Windows-LanguageFeatures-Basic-pt-br-Package Microsoft-Windows-LanguageFeatures-Handwriting-pt-br-Package Microsoft-Windows-LanguageFeatures-OCR-pt-br-Package Microsoft-Windows-LanguageFeatures-TextToSpeech-pt-br-Package Table 25. Russian Language packages Microsoft-Windows-Client-LanguagePack-Package-ru-RU Microsoft-Windows-LanguageFeatures-Basic-ru-ru-Package Microsoft-Windows-LanguageFeatures-Handwriting-ru-ru-Package Microsoft-Windows-LanguageFeatures-OCR-ru-ru-Package Microsoft-Windows-LanguageFeatures-TextToSpeech-ru-ru-Package Table 26. Spanish Language packages Microsoft-Windows-Client-LanguagePack-Package-es-ES Microsoft-Windows-LanguageFeatures-Basic-es-es-Package Microsoft-Windows-LanguageFeatures-Handwriting-es-es-Package Microsoft-Windows-LanguageFeatures-OCR-es-es-Package Microsoft-Windows-LanguageFeatures-Speech-es-es-Package Microsoft-Windows-LanguageFeatures-TextToSpeech-es-es-Package Table 27. Swedish Additional administrator utility and settings information 47 Table 27. Swedish Language packages Microsoft-Windows-Client-LanguagePack-Package-sv-SE Microsoft-Windows-LanguageFeatures-Basic-sv-se-Package Microsoft-Windows-LanguageFeatures-Handwriting-sv-se-Package Microsoft-Windows-LanguageFeatures-OCR-sv-se-Package Microsoft-Windows-LanguageFeatures-TextToSpeech-sv-se-Package Imaging using Dell Application Control Center Dell Wyse thin clients that run the Windows 10 IoT Enterprise 2019 LTSC operating system can be imaged using Dell Application Control Center (DACC). The below procedures are followed to perform imaging: USB Imaging Wyse Management Suite Imaging USB imaging using DACC Steps 1. Image the device with the latest Windows 10 IoT Enterprise RS5 image. 2. Log in to the administrator's account and disable UWF. 3. Install the latest DAS bundle that deploys DACC by default. 4. Right-click the Application Control Center shortcut icon on the desktop and select Run as administrator. 5. Go to Imaging section > Image Settings. 6. Select Imaging Source as USB from the drop-down list. 7. Set Host Name Calculation feature as Enable Feature or Disable Feature under Disable Host Name Calculation based on your requirement. NOTE: Host Name Calculation is a client behavior that is configurable and allows resetting the hostname to Windows Embedded Standard <MAC address>. To get the hostname calculation to occur for the local or the target client to which the captured golden image is to be pushed, follow the below steps: a. Clear Enable Feature under Disable Host Name Calculation option to reset the hostname of the client to Windows Embedded Standard <MAC address>. b. The hostname of the machine you are capturing the image from must be set as MINWITHNET for hostname calculation to occur. 48 Additional administrator utility and settings information Figure 1. Clear Enable Feature If you do not want the hostname calculation to occur for the target client to which the captured golden image is pushed, follow the below step: a. Select Enable Feature under Disable Host Name Calculation. This process notifies the underlying subsystem to not reset the hostname to Windows Embedded Standard <MAC address>. Figure 2. Select Enable Feature 8. Select the Confirm Selections check box and click Capture Image. Additional administrator utility and settings information 49 Figure 3. Confirm Image for Capture in Application Control Center A window confirming USB imaging is displayed. 9. Click Ok to initiate the precustom Sysprep process. The device shuts down after the precustom Sysprep process is complete. NOTE: Connect the USB drive that is configured for USB imaging before you power on the device. 10. Power on the device and press F12 when the one-time boot menu is displayed. 11. Select the USB option and boot the device using the configured USB drive. 12. Click the icon under Pull device image under USB drive in the Dell Wyse USB Imaging Tool window. 13. Click Ok to initiate the Image Pull process. Once the image pull completes, a message stating the image pull was successful is displayed. 14. Remove the USB drive and click Restart. The USB drive is ready with the golden image that can be used to deploy on another device. Wyse Management Suite imaging using DACC Steps 1. Image the device with the latest Windows 10 IoT Enterprise RS5 image. 2. Log in to the administrator's account and disable UWF. 3. Install the latest DAS bundle that deploys DACC by default. 4. Register the device to Wyse Management Suite server by following the steps below: a. Go to system tray. b. Click the WDA icon. c. Select WMS from the management server drop-down list and register the device by providing valid inputs. 5. Log in to the Wyse Management Suite server when the device is registered. 6. Click Devices and select your registered device after logging in to the Wyse Management Suite server. 7. Select Pull OS Image option from More Actions drop-down list. Pull OS Image window is displayed. 8. Enter Name of image, File repository path, Pull type, and Default options . 50 Additional administrator utility and settings information 9. Click Prepare for Image Pull. Image Pull Request from System Admin window is displayed on the registered device. 10. Click Pull now to capture image without running custom Sysprep. 11. Click Pull after sysprep for capture image by running custom Sysprep. 12. Right-click the Application Control Center shortcut icon on the desktop and select Run as administrator. 13. Go to Imaging section > Image Settings. 14. Select Imaging Source as USB from the drop-down list. 15. Set the Host Name Calculation feature as Enable Feature or Disable Feature under Disable Host Name Calculation based on your requirement. NOTE: Host Name Calculation is a client behavior that is configurable and allows resetting the hostname to Windows Embedded Standard <MAC address>. To get the hostname calculation to occur for the local or the target client to which the captured golden image is to be pushed, follow the below steps: a. Clear Enable Feature under Disable Host Name Calculation option to reset the hostname of the client to Windows Embedded Standard <MAC address>. b. The hostname of the machine you are capturing the image from must be set as MINWITHNET for hostname calculation to occur. Figure 4. Clear Enable Fetaure If you do not want the hostname calculation to occur for the target client to which the captured golden image is pushed, follow the below step: a. Select Enable Feature under Disable Host Name Calculation. This process notifies the underlying subsystem to not reset the hostname to Windows Embedded Standard <MAC address>. Additional administrator utility and settings information 51 Figure 5. Select Enable Feature 16. Select the Confirm Selections check box and click Capture Image. Figure 6. Confirm Image for Capture in Application Control Center The device shuts down after the precustom Sysprep process is complete. 17. Power on the device. The device uploads the image to the Wyse Management Suite server. 52 Additional administrator utility and settings information 6 System administration To maintain your thin client device environment, you can perform local and remote system administration tasks. Accessing thin client BIOS settings About this task To access the thin client BIOS settings, do the following: Steps 1. During system start-up, press F2 when you see a Dell logo. The BIOS Setup screen is displayed. 2. Change the BIOS settings as required. 3. Save the changes and exit. Unified Extensible Firmware Interface and secure boot Unified Extensible Firmware Interface (UEFI) is a standard firmware interface designed to improve software interoperability and address limitations of BIOS. UEFI is designed to replace Basic Input Output System (BIOS). Secure Boot is a feature on UEFI-based clients that help increase the security of a client by preventing unauthorized software from running on a client during the boot sequence. It checks whether each software has a valid signature, including the operating system (OS) that is loaded during booting. The thin client device is enabled with UEFI and Secure Boot. Due to this feature, you cannot boot from USB keys if you do not enter the BIOS, disable Secure Boot, change the boot mode to Legacy, and enable the Boot from USB option. Creating bootable UEFI USB key About this task To create a bootable UEFI USB key, do the following: Steps 1. Obtain an executable UEFI shell. 2. Save the file as bootx64.efi on your client. 3. Format the USB key with FAT32. 4. In the USB key, create the \efi\boot directory. 5. Copy the bootx64.efi file to the \efi\boot directory on the USB key. The bootable UEFI USB key is created. Using Dell Wyse Management Suite Wyse Management Suite is the next generation management solution that lets you centrally configure, monitor, manage, and optimize your Dell Wyse thin clients. The new Suite makes it easier to deploy and manage thin clients with high functionality and performance, and ease of use. It also offers advanced feature options such as cloud versus on-premises deployment, System administration 53 manage-from-anywhere using a mobile application, enhanced security such as BIOS configuration and port lockdown. Other features include device discovery and registration, asset and inventory management, configuration management, operating system and applications deployment, real-time commands, monitoring, alerts, reporting, and troubleshooting of endpoints. For more information about Dell Wyse Management Suite, go to dell.com/support/manuals. NOTE: Dell Cloud Client Manager (CCM) is re-envisioned as Wyse Management Suite and provides new features, functionalities with major product level enhancements to CCM R14. For more information, see Wyse Management Suite Release Notes at dell.com/support/manuals. Existing customers can continue to manage their thin clients as before, and take advantage of the new features introduced in this release. Ports and slots The thin client device has many ports and slots. For information on the ports and slots on the thin client device at your workplace, see the respective Quick Start Guide at dell.com/support. To provide the services through the ports, install the appropriate drivers or software on the thin client device. NOTE: You can install other services and add-ons that are available from the Dell website for free or for a licensing fee. You can configure the thin client device to use Bluetooth-enabled peripherals. For more information, see Configuring Bluetooth connections. TightVNC--server and viewer To configure or reset a thin client device from a remote location, use TightVNC--server and viewer. TightVNC is primarily intended for support and troubleshooting purposes. Install TightVNC locally on the thin client device. After installation, it allows the thin client to be shadowed, operated and monitored from a remote device. TightVNC Server starts automatically as a service upon thin client device restart. The initialization of TightVNC Server can also be controlled by using the Services window by this procedure. To open TightVNC Server window: 1. Log in as an Administrator. 2. Click Start Menu > TightVNC > TightVNC Server. NOTE: TightVNC Viewer is available from TightVNC website. TightVNC is included in WDM software as a component. TightVNC Viewer must be installed on a shadowing or remote machine before use. If you want to permanently save the state of the service, ensure that you flush the files of the Unified Write Filter during the current system session. TightVNC--Pre-requisites Before TightVNC server installation on a remote machine, to access a thin client device you must know the following: IP address or valid DNS name of the thin client device to shadow, operate or monitor. Primary password of the thin client device to shadow, operate or monitor. NOTE: To obtain the IP address of the thin client device, move the pointer over the TightVNC icon in the taskbar, To configure TightVNC server, the default password is DELL. 54 System administration Using TightVNC to shadow a thin client About this task TightVNC Server starts automatically as a service upon thin client startup. The TightVNC Server service can also be stopped and started by using the Services window. Steps 1. Log in as an administrator. 2. Go to Start > Control Panel > Administrative Tools > Services, and then select TightVNC Server. 3. You may also use the TightVNC Server features in Start > TightVNC. To shadow a thin client from a remote machine: a. On a remote machine on which TightVNC Viewer is installed, open the New Tight VNC Connection dialog box. b. Enter the IP address or valid DNS name of the thin client that is to be shadowed or operated or monitored. c. Click OK. The VNC Authentication dialog box is displayed. d. Enter the Password of the thin client that is to be shadowed; this is the Primary Password of the thin client that is to be shadowed. e. Click OK. The thin client that is to be shadowed or operated or monitored is displayed for the administrator in a separate window on the remote machine. Use the mouse and keyboard on the remote machine to operate the thin client just as you would if you were operating it locally. Configuring TightVNC server properties on the thin client Steps 1. To open the TightVNC Server Configuration (offline) dialog box, go to Start > TightVNC > TightVNC Server -- Offline Configuration. The TightVNC Server Configuration (offline) dialog box is displayed. 2. In the Server tab, set the Primary password. Use this password while shadowing the thin client. Default primary password is Wyse. 3. In the Server tab, select the following check boxes: Accept incoming connections Require VNC authentication Enable file transfers Hide desktop wallpaper Show icon in the notification area Serve Java Viewer to web clients Use mirror driver if available Grab transparent windows 4. Retain the following check boxes blank: Block remote input events Block remote input on local activity No local input during client sessions 5. In the Main server port box, select or type 5900. 6. In the web access port box, select or type 5800. 7. In the Screen poling cycle box, select or type 1000. 8. Click OK. NOTE: For security purposes, it is recommended that the primary password be changed immediately upon receipt of the thin client and it is for administrator use only. System administration 55 7 Network architecture and server environment This section contains information about the network architecture and enterprise server environment needed to provide network and session services for your thin client. Understanding how to configure your network services Network services provided to thin clients can include DHCP, FTP file services, and DNS. You can configure, design, and manage your network services depending on the availability in your environment. You can configure your network services using: Dynamic Host Configuration Protocol (DHCP) Domain Name System (DNS) Using Dynamic Host Configuration Protocol A thin client is initially configured to obtain its IP address and network configurations from a Dynamic Host Configuration Protocol (DHCP) server. A DHCP server provides the IP address or DNS name of the FTP server and the FTP root-path location of software in Microsoft.msi form to access the IP address and network configurations through the DHCP upgrade process. DHCP is recommended to configure and upgrade thin clients as it saves time and efforts needed to complete these processes locally on multiple thin clients. If a DHCP server is not available, fixed IP addresses can be assigned and it must be entered locally for each device. A DHCP server can also provide the IP address of the WMS server. DHCP options The DHCP options listed in the following table are accepted by the thin clients. Table 28. DHCP options Option 1 3 Description Subnet Mask Router 6 Domain Name Server (DNS) 12 Hostname 15 Domain Name 43 Vendor Class Specific Information 50 Requested IP 51 Lease Time Notes Required Optional but recommended. It is not required unless the thin client must interact with servers on a different subnet. Optional but recommended Optional Optional but recommended Optional Required Required 56 Network architecture and server environment Table 28. DHCP options Option 52 53 54 55 57 58 59 61 155 156 157 158 159 160 163 164 165 168 165 166 167 199 Description Notes Option Overload Optional DHCP Message Type Required DHCP Server IP Address Recommended Parameter Request List Sent by thin client Maximum DHCP Message Size Optional (always sent by thin client) T1 (renew) Time Required T2 (rebind) Time Required Client identifier Always sent Remote Server IP Address or name Optional Logon User Name used for a connection Optional Domain name used for a connection Optional Logon Password used for a connection Optional Command Line for a connection Optional Working Directory for a connection Optional SNMP Trap server IP Address list Optional SNMP Set Community Optional Remote Desktop Connection startup published applications Optional Name of the server of the virtual port Optional Wyse Management Suite server URL option tag Optional MQTT server URL option tag Optional Wyse Management Suite CA Validation Optional server URL option tag Wyse Management Suite Group Token server URL option tag Optional NOTE: For more information on configuring a DHCP server, see www.microsoft.com. Using Domain Name System Thin client devices accept valid Domain Name System (DNS) names registered on a DNS server available to the enterprise intranet. The thin client device sends a query to DNS server on the network to translate the name into the corresponding IP address. DNS allows hosts to be access by their registered DNS names rather than their IP address. Every Windows DNS server in Windows Server 2000 and later includes Dynamic DNS (DDNS) and every server registers dynamically with the DNS server. For DHCP entry of DNS domain and server location information, see Using Dynamic Host Configuration Protocol (DHCP). About Citrix Studio Citrix Studio is a software program that enables you to configure and manage your personalized desktops and applications. It provides an easy end-user computing experience across all devices and networks while delivering optimal performance, better security, and improved personalization. Network architecture and server environment 57 NOTE: For more information about installing and configuring the Citrix Studio, go to Citrix Website. Citrix Studio consists of various wizards that allows you to perform the following tasks: Publish virtual applications Create groups of server or desktop operating systems Assign applications and desktops to users Grant user access to resources Assign and transfer permissions Obtain and track Citrix licenses Configure StoreFront All available Virtual Desktop Applications (VDA) are listed in the Studio. From the VDA list, select the application you would like to publish. Information displayed in the Studio is received from the Broker Service in the Controller. About VMware Horizon View Manager VMware View is an enterprise-class virtual desktop manager that securely connects authorized users to centralized virtual desktops. It provides a complete, end-to-end solution that improves control and manageability and provides a familiar desktop experience. Client software securely connects users to centralized virtual desktops, back-end physical systems, or terminal servers. NOTE: For more information, on installing and configuring View Manager, go to VMware Website. VMware View includes the following key components: View Connection Server--A software service that acts as an intermediate for client connections by authenticating and then directing incoming remote desktop user requests to the appropriate virtual desktop, physical desktop, or terminal server. View Agent--A software service that is installed on all guest virtual machines, physical systems, or terminal servers. View Manager manages this software. The agent provides features such as the Remote Desktop Connection monitoring, virtual printing, remote USB support, and single sign-on. View Client--It is a locally installed software application that communicates with View Connection Server, to allow users to connect to their desktops using Microsoft Remote Desktop Connection. View Portal--This component is similar to View Client but provides a View user interface through a web browser. It is supported on multiple operating systems and browsers. View Administrator--This component provides the View administration through a web browser. View administrators use it to do the following: Manage configuration settings. Manage virtual desktops and entitlements of desktops of the Windows users and groups. View Administrator also provides an interface to monitor log events and is installed with View Connection Server. View Composer--To allow View Manager to rapidly deploy multiple linked clone desktops from a single centralized base image, View Composer software service is installed on the Virtual Center server. 58 Network architecture and server environment 8 Installing firmware using USB Imaging Tool Firmware installation is the process of installing the Windows 10 IoT Enterprise firmware on your thin client. Use the Dell Wyse USB Imaging Tool version 3.2.0 to install the Windows 10 IoT Enterprise image on your thin client. For information about installation instructions, see the Dell Wyse USB Imaging Tool version 3.2.0 User's Guide at downloads.dell.com/wyse/. Installing firmware using USB Imaging Tool 59 9 Frequently asked questions How to install Skype for Business To install Skype for business on your thin clients, do the following: 1. Log in as an administrator. 2. Disable Unified Write Filter. 3. Download the Skype for Business stand-alone (64-bit) from https://support.microsoft.com. 4. Double-click the .exe file, and click Run. 5. After the installation is complete, click Close. 6. Launch Skype for business. 7. On the license agreement screen, click Accept. 8. Enable Unified Write Filter. For more information, see Install Skype for Business at https://support.office.com. How to set up a smart card reader To set up a smart card reader, do the following: 1. Log in as an administrator. 2. Disable Unified Write Filter. 3. Download your preferred smart card application. 4. Extract the file to your local drive. 5. Connect the smart card reader with the smart card, and click Setup. 6. After the installation is complete, install the server certificate if you want to establish a connection for Citrix or VMWare setup. 7. Enable Unified Write Filter. 8. Connect to your preferred VDI session such as Citrix, VMware, or RDP. How to use USB Redirection USB Redirection enables you to connect an external device into a USB port on your thin client and access the device using a remote desktop or application. You can configure USB Redirection in a Citrix Virtual Apps and Desktops (formerly Citrix XenDesktop) environment. For more information, see Citrix Generic USB Redirection Configuration Guide at support.citrix.com. You can also configure options to use and manage USB devices in a View virtual desktop session. For more information, see USB Device Redirection, Configuration, and Usage in View Virtual Desktops at www.vmware.com How to prepare a Windows 10 IoT Enterprise operating system image for capture You can prepare a Windows 10 IoT Enterprise operating system image for capture using any of the following methods: Local interface Wyse Management Suite 60 Frequently asked questions Using Sysprep--User Interface The System Preparation tool (Sysprep) can be configured using the inbuilt user interface. Using this tool, you can clear the data and customize the system as per your requirement. The operating system is installed as a fresh installation. The Sysprep tool is used with other deployment tools to install the Windows operating systems with minimal intervention by an administrator. Buildmaster.cmd is the main program that calls other executable files and prepares the thin client for the Windows installation. Buildmaster.cmd is located in the<drive C>\Windows\Setup on all installations. Always run the Sysprep file from the <drive C>\Windows\Setup and on the version of Windows with which it was installed. The Sysprep tool contains the following two options: Custom Sysprep, see Running the Custom Sysprep tool. Config Sysprep, see Running the Config Sysprep tool. Prerequisites The following are the pre-requisites to run the Custom Sysprep tool: Unified Write Filter must be disabled. Logging framework must be available on your thin client. Power Shell script execution environment must be available. Custom Sysprep and Configuration Sysprep (SCCM) scripts must be available. Host Name calculation feature must be available. If the flash drive or HDD size is more than 32 GB, reduce it to less than 32 GB for a better custom sysprep process. NOTE: You cannot access the thin client if you terminate the Sysprep process. Make sure that the device is ready before you use the Sysprep tool. CAUTION: After you run the Sysprep tool, enable the Unified Write Filter to ensure device security. Running Custom Sysprep tool Prerequisites Disable File based Write Filter. Logging framework must be available on your thin client. PowerShell script execution environment, Custom Sysprep, Configuration Sysprep (SCCM) scripts, and Hostname calculation feature must be available. Reduce the flash drive or hard drive size to less than 16 GB. NOTE: You must shrink the drive C manually to reduce the hard drive size to 16 GB or less. About this task To run the Custom Sysprep tool, do the following: Steps 1. Go to <drive C>\Windows\Setup. 2. Right-click Build_Master.cmd, and select Run as administrator. The Config Master window is displayed. Frequently asked questions 61 Figure 7. Config Master 3. Click Next. The Configuration screen is displayed. Figure 8. Configuration 4. Select Custom configuration in the Configurations section. 5. Enable or disable hostname calculation in the Host Name calculation section. 6. Enter the appropriate values in the Configure Domain options section, and click Save Credentials--optional. 7. Click OK when prompted--optional. 8. Select Enable local account credentials changes--optional. The changes that are made to the credentials are applied. 62 Frequently asked questions 9. Click Next. The Credential Manager page is displayed. 10. Select the user account, and type the login credentials. 11. Click Save. 12. Click Apply to save the changes. This process takes 510 minutes to complete. The device turns off after the Sysprep process is complete. NOTE: You cannot access the thin client if you terminate the Sysprep process. Make sure that the device is ready before you use the Sysprep tool. Running the Config Sysprep tool About this task To run the Config Sysprep tool, do the following: Steps 1. Go to <drive C>\Windows\Setup. 2. Right-click Build_Master.cmd, and select Run as administrator. The Config Master window is displayed. Figure 9. Config Master 3. Click Next. The Configuration screen is displayed. Frequently asked questions 63 Figure 10. Configuration 4. In the Configurations section, select SCCM configuration. 5. In the Host Name calculation section, enable or disable hostname calculation. NOTE: The Configure Domain Option and Configure local account credentials field are grayed out. 6. Click Apply to save the changes. After the completion of SCCM Config Sysprep, the HAgent service ends. You can now perform the pull operation using SCCM. Using Wyse Management Suite Prerequisites If you are using Wyse Management Suite 1.3 remote repository, then Recovery/ Recovery + OS pull templates are not available in the repository. You must upgrade Wyse Management Suite to 1.4 to access the templates. Steps 1. Go to the Windows Embedded Standard or ThinLinux device page. 2. Select Pull OS Image option, from the More Actions drop-down list. 3. Enter or select the following details: Name of Image--Provide a name for the image. To replace the image with a similar name and the image files that are not completed successfully, click Override name. 64 Frequently asked questions File repository--From the drop-down list, select the file repository to where the image is uploaded. There are two types of file repositories: Local repository Remote Wyse Management Suite repository Pull Type--Select either Default or Advanced based on your pull type requirement. When the Default pull type is selected, the following options are displayed: Compress OS BIOS When the Advanced pull type is selected, a drop-down list for selecting the template is displayed. Select any template which is available by default. NOTE: You can use custom templates by editing the existing or default templates. 4. Click Prepare for Image Pull. Results When the Pull OS Image command is sent, the client device receives an image pull request from the server. An image pull request message is displayed on the client side. Click either of the following options: Pull after sysprep--The device restarts, and logs in to the operating system in a disabled state. Run the custom sysprep. After the custom sysprep is complete, the device boots to Merlin operating system and the image pull operation is performed. Pull now--The device boots to the Merlin operating system and the image pull operation is performed. How to capture and push Windows 10 IoT Enterprise operating system image You can capture and push Windows 10 IoT Enterprise operating system image using any of the following methods: Wyse Management Suite Microsoft System Center Configuration Manager (SCCM) USB Imaging Tool For information about Wyse Management Suite and SCCM, see the respective guides at https://support.dell.com/manuals. For information about USB Imaging Tool, see Dell Wyse USB Imaging Tool User's Guide at https://downloads.dell.com/wyse. How to update Windows 10 IoT Enterprise 2016 LTSB to Windows 10 IoT Enterprise 2019 LTSC Dell Wyse 5070 Thin Clients manufactured before October 3, 2019 are licensed for Windows 10 IoT Enterprise 2016 LTSB only. Wyse 5070 Thin Clients manufactured after October 3, 2019 are licensed with Windows 10 IoT Enterprise 2019 LTSC even if they are ordered with Windows 10 IoT Enterprise 2016 LTSB. The upgrade kit enables you to update to Windows 10 IoT Enterprise 2019 LTSC. For instruction on how to upgrade your operating system, see Updating from Windows 10 IoT Enterprise 2016 LTSB to Windows 10 IoT Enterprise 2019 LTSC Release Notes at https://www.dell.com/support/manuals. Frequently asked questions 65 10 Troubleshooting Keyboard customization issues To customize the keyboard language that is not supported by default, do the following: 1. Go to C:\Windows\system32\oobe. 2. Delete the oobe.xml file and the related subdirectories. 3. Customize the sysprep.xml file manually and set the keyboard, locales, and so on, to the respective language. 4. Deploy the .xml file manually, or by using SCCM or Custom Sysprep. All preferences for keyboard, locale, time zone, countries, and so on, are applied. Resolving memory issues To troubleshoot Out of memory error in Dell Wyse Windows Embedded thin clients, use one of the following tools to identify and adjust your memory requirements: Windows Task Manager Unified Write Filter File Explorer NOTE: The name of the error dialog box helps you to identify the source of the memory issue. Using Windows Task Manager 1. Log in as an administrator. 2. Press Ctrl+Alt+Delete. 3. Click Task Manager. The Task Manager window is displayed. 4. Click More details. 5. Click the Performance tab, and analyze your system memory resources. 6. Close the programs that are using more memory. Using Unified Write Filter 1. Log in as an administrator. 2. Double-click the UWF icon in the system tray. 3. Configure the Amount of RAM to be used for FBWF cache (MB) option. Using File Explorer You can use File Explorer to verify the size of your Z: (RAMDisk) drive. You must refresh the application to view the updated values. 66 Troubleshooting CADMAP tool interfering with published application shortcut keys The Winlockworkstation.exe add-on must be pushed using Wyse Management Suite or SCCM. This feature enables you to use WIN+L key combination in remote sessions. You can enable or disable the WIN+L key combination in local sessions using WinLock Workstation application. You can also use /WE or /WD parameters to enable or disable the WIN+L key combination. In VDI sessions, WIN+L functionality works as configured on the server. On closing VDI sessions, the WIN+L functionality retains the user configured state that is pushed from server using the Winlockworkstation.exe add-on. For more information, see CAD MAP VDI Enhancement (WIN+L support) version 3.0.3.0 and WinLock workstation version 3.0.3.0 Add-on release notes at support.dell.com. WiFi settings configured from Wyse Management Suite are not persistent across multiple Wyse 5070 thin clients When you configure a WiFi connection on a Wyse 5070 Thin Client, it connects to a specific wireless network (SSID) without asking for the password. When the same configuration is exported to Wyse Management Suite and deployed to other Wyse 5070 Thin Clients, the configuration is applied and you are prompted to enter a password to connect to the same wireless network. To make the WiFi settings persistent, do the following: Steps 1. Connect the Wyse 5070 Thin Client to the wireless network. 2. Run DWirelessProfileEditor.exe file. The Wireless Profile Password Editor window is displayed. 3. Browse to the destination path to save the profile as an xml file and click Save. 4. Click the Export WiFi Profiles button in the Wireless Profile Password Editor window. 5. From the Profiles drop-down list, select the profile to deploy the configuration. 6. Clear the Password field, and enter the password again. 7. Click Change Password. NOTE: Do not click the Export WiFi Profiles button again. 8. Close the Wireless Profile Password Editor window. 9. Log in to Wyse Management Suite. 10. Go to Apps & Data > File Repository > Inventory. 11. Click Add File. 12. Browse to the xml file. 13. From the Type drop-down list, select Windows Wireless Profile. 14. Enter the description. 15. Select the Override existing file option if you want to overwrite the present configuration. 16. Click Upload. 17. Go to Groups & Configs > Edit Profiles > WES > Network. 18. Click Configure this item. 19. From the Windows Wireless Profiles drop-down list, select the uploaded file. 20. Click Save & Publish. Troubleshooting 67 Wyse Management Suite registration information is not cleared after the Sysprep process Wyse Management Suite registration information is not cleared after the Sysprep process in Wyse 5070 Thin Clients. This leads to incorrect registration information that is displayed in the thin client. To troubleshoot the issue, do the following: Prerequisites Unregister the device from the Wyse Management Suite server before preparing the device for an image pull. Steps 1. Go to C:\Program Files\Wyse\WDA\Config. 2. Open the CCMProtocolConfig.xml file. 3. Clear the MAC ID information from the file. In the following example, clear 00:25:64:96:59:95. <AgentConfig> <AgentVersion>2.3.0.0</AgentVersion> <GroupKey>defadefadefa</GroupKey> <MqttServer>win-wms14.domainxyz.com</MqttServer> <MqttServerPort>1883</MqttServerPort> <UseSSL>True</UseSSL> <OwnerId></OwnerId> <WyseId></WyseId> <CAValidation>false</CAValidation> <AuthenticationCode></AuthenticationCode> <MacAddress>00:25:64:96:59:95</MacAddress> </AgentConfig> 4. Run build_master.cmd to prepare the image for deployment and pull the image using the USB imaging tool. 68 TroubleshootingAntenna House PDF Output Library 7.0.1614